New Qakbot Phishing Campaigns Emerge

Estimated read time 3 min read

In a recent report by Microsoft Threat Intelligence, a resurgence of Qakbot phishing campaigns has been identified, marking a concerning development in the threat landscape. Following a law enforcement disruption operation in August 2023, Microsoft detected a low-volume campaign targeting the hospitality industry, with the first wave initiated on December 11. This blog post sheds light on the key findings from the report and provides insights into the evolving tactics of the notorious Qakbot malware.

Qakbot Phishing Campaign Overview:

The phishing campaign in question involved the distribution of a PDF posing as communication from an IRS employee. Upon closer inspection, the PDF contained a deceptive URL leading to the download of a digitally signed Windows Installer (.msi). The execution of this MSI, in turn, triggered the activation of Qakbot using an “hvsi” execution of an embedded DLL. Notably, the MSI package was signed with the SignerSha1/Thumbprint 50e22aa4b3b145fe1193ebbabed0637fa381fac3, adding a layer of sophistication to the attack.

Qakbot phishing Technical Details:

An embedded configuration EPOCH timestamp revealed that the payload was generated on December 11, and the campaign code was identified as “tchk06.” What sets this campaign apart is the use of Qakbot version 0x500, a previously unseen iteration of the malware. Microsoft Defender XDR has been proactive in detecting and thwarting the malicious components and activities associated with these new Qakbot campaigns.

Qakbot in the Cyber Threat Landscape:

Qakbot, also known as Qbot or Pinkslipbot, is a modular second-stage malware with multifaceted capabilities. Originally designed as a credential stealer, it has since evolved into a banking trojan, worm, and remote access trojan (RAT). Categorized by CISA as one of the top malware strains of 2021, Qakbot is notorious for its ability to steal sensitive data and self-propagate across networks.

The malware offers remote code execution (RCE) capabilities, enabling attackers to conduct manual attacks for secondary objectives, such as network scanning and injecting ransomware. Qakbot has been utilized by prominent ransomware gangs, including REvil, ProLock, and Lockbit, to distribute big-game hunting ransomware strains.

Qakbot’s Impact Over the Years:

Discovered in 2008, Qakbot has undergone constant updates, with its usage fluctuating in tandem with its update cycle. After significant updates in 2015, Qakbot experienced a resurgence, and in 2020, a novel strain resulted in a staggering 465 percent increase in its year-over-year share of cyberattacks. Notably, in 2021, Qakbot played a role in the high-profile cyber-breach of JBS, disrupting meat production facilities and leading to an $11 million ransom payment.

June Bauer

Pop cultureaholic, Technology expert, Web fanatic and a Social media geek. If you have any questions or comments please feel free to email her at june@thecoinspost.com or contact her on X @JuneTBauer1

You May Also Like

More From Author

+ There are no comments

Add yours