Deep-dive research, threat intelligence reports, APT analysis, and expert insights from India's leading indigenous cybersecurity team.
Our researchers and analysts share what they're discovering — from zero-day analysis to nation-state TTPs.
Phishing attacks continue to pose a significant threat to individuals and organizations worldwide. Analysts at SecneurX discovered a sophisticated Microsoft-branded phishing page engineered to harvest login credentials — employing advanced evasion techniques and lookalike domains to bypass email filters and deceive enterprise users.
In the ever-evolving landscape of cyber threats, new campaigns emerge with innovative tactics to compromise unsuspecting targets. SecneurX analysts uncovered a malicious campaign leveraging Yolasite.com free hosting to distribute payloads — detailing the full infection chain and providing indicators of compromise for defenders.
Ahtw is ransomware that belongs to the Djvu/Stop Ransomware family. Analysts at SecneurX observed that among the prominent ransomware attacks, Ahtw encrypts victim files and demands a ransom payment — our full technical analysis covers the infection chain, file encryption routine, and mitigation steps.
Neon is a ransomware that belongs to the Djvu/Stop Ransomware family. Analysts at SecneurX observed that it encrypts victim files and appends the .neon extension. Our team provides a full technical breakdown including persistence mechanisms and decryption guidance for affected victims.
Neqp is a ransomware that belongs to the Djvu/Stop Ransomware family. Analysts at SecneurX analyzed a live sample — documenting behavioral patterns, file encryption routines, and recommended mitigation strategies for organizations affected by this Djvu/Stop variant.
Xash is ransomware that belongs to the Djvu/Stop Ransomware family. Analysts at SecneurX observed that it targets Windows systems, encrypting files across all user directories and demanding payment via email communication with the threat actor. Full IOC list included.
Gash is ransomware that belongs to the Djvu/Stop Ransomware family. Analysts at SecneurX observed that this variant deploys a bundled information stealer alongside encryption, targeting browser credentials and cryptocurrency wallets in addition to file ransoming.
Qopz is ransomware that belongs to the Djvu/Stop Ransomware family. Analysts at SecneurX observed that among the prominent ransomware variants, Qopz uses AES-256 encryption and communicates with C2 servers to receive unique decryption keys per victim machine.
SecneurX Analysts found a Fake Chrome Update campaign. Malware authors used compromised websites to display fake Google Chrome update prompts, delivering malware to unsuspecting users who believed they were installing a legitimate browser update.
SecneurX Analysts found Dark Power Ransomware in the wild. Dark Power ransomware encrypts files and appends its extension ('.dark_power') to filenames. Our analysis covers its attack chain, persistence mechanisms, ransom note structure, and key indicators of compromise for detection.
Analysts at SecneurX have found that the Redline malware is abusing Microsoft's OneNote to spread malware. OneNote is one of the most trusted Microsoft apps — making this vector especially effective at evading user suspicion and security filters while delivering its payload.
Every insight in this blog comes from live data processed through SecneurX's detection engines. See how our products put this intelligence to work for your organisation.