Downloaders Obfuscation Techniques Python Masked in Memory: A Hidden .PYC fragment utilises cvtres.exe to communicate with C&C During a routine analysis at K7 Labs, we encountered a Python-based malware sample that uses multi-stage obfuscation. The de-obfuscated result […] Praveen Babu November 19, 2025
Advanced Persistent Threats Macro Malicious Links Obfuscation Techniques Breakingdown of Patchwork APT Patchwork APT, also known as Dropping Elephant, Monsoon, and Hangover Group, has been active since at least 2015. This threat […] Uma Madasamy September 30, 2025
Malicious DLLs Malicious Links PowerShell Remote Access Trojan Social Networking Apps From LNK to RAT: Deep Dive into the LNK Malware Infection Chain Attackers keep availing the use of Windows shortcut (.LNK) files to deliver malware. These LNK files normally used as shortcuts […] Priyadharshini September 24, 2025
Ransomware Ransomware-as-a-Service (RaaS) Examining the tactics of BQTLOCK Ransomware & its variants Ransomware-as-a-Service (RaaS), marketed on dark web forums or Telegram channels, is a growing model in the cybercrime ecosystem where ransomware […] Harihara Sudhan August 22, 2025
Data Privacy PowerShell Scripting Malware Stealer Trojan Silent Watcher: Dissecting Cmimai Stealer’s VBS Payload Recently, we at K7 Labs saw a tweet about the Cmimai Stealer, a VBS (Visual Basic Script) infostealer that began […] Azhagan KMS August 8, 2025
K7 is the best antivirus I have used so far. Best service, easy to operate. Thank you K7! Mr. Puneet Yadav