New QBot Banking Trojan Campaign Exploits Business Emails to Distribute Malware

April 17, 2023
Financial Security / Malware

Recent findings by Kaspersky reveal a fresh QBot malware campaign that uses compromised business correspondence to deceive victims into installing the malicious software. This ongoing operation, which began on April 4, 2023, is primarily targeting users in Germany, Argentina, Italy, Algeria, Spain, the U.S., Russia, France, the U.K., and Morocco.

QBot, also known as Qakbot or Pinkslipbot, has been active since at least 2007. It not only steals passwords and cookies from web browsers but also acts as a backdoor for delivering next-stage payloads like Cobalt Strike or ransomware. Distributed through phishing campaigns, QBot has undergone continuous updates to incorporate techniques that evade detection, such as anti-VM, anti-debugging, and anti-sandbox measures. Notably, it emerged as the most prevalent malware in March 2023, according to Check Point. In its early distribution, it relied on infected websites and other methods.

New QBot Banking Trojan Campaign Exploits Business Emails to Distribute Malware

April 17, 2023
Financial Security / Malware

Recent research from Kaspersky has unveiled a new initiative utilizing the QBot banking Trojan to compromise business email communications as a method to disseminate malware. This latest campaign began on April 4, 2023, and has notably focused its efforts on targeted users across several countries, including Germany, Argentina, Italy, Algeria, Spain, the United States, Russia, France, the United Kingdom, and Morocco.

QBot, sometimes referred to as Qakbot or Pinkslipbot, has been operational since at least 2007, and its primary function is to extract sensitive information such as passwords and cookies from victims’ web browsers. Furthermore, QBot serves as a backdoor that allows for the deployment of subsequent payloads, including advanced tools like Cobalt Strike and various ransomware variants.

The malware continues to evolve, with recent updates incorporating sophisticated techniques designed to evade detection mechanisms. Specifically, it employs anti-VM, anti-debugging, and anti-sandbox methodologies to complicate analysis and hinder counteract measures by security professionals. Kaspersky notes that QBot has also been recognized as one of the most prevalent forms of malware in March 2023, according to Check Point’s findings.

Phishing campaigns remain the primary vector for distributing QBot. This approach leverages the trust inherent in business communication to lure unsuspecting victims into executing malicious payloads unknowingly. The success of these campaigns can be attributed to the perceived legitimacy of the emails, which often appear as routine business communications.

In terms of adversary tactics and techniques, the initial access for this campaign likely stems from targeted phishing efforts intended to entice users into downloading malware-laden attachments or clicking on malicious links. The deployment of QBot takes advantage of various vulnerabilities to ensure persistence on infected systems and may use privilege escalation techniques to gain further access to sensitive data.

The breadth of QBot’s target demographic highlights a significant concern for business owners, particularly in sectors reliant on effective digital communication. Recognizing such threats underscores the importance of implementing robust cybersecurity measures, including employee training on recognizing phishing attempts and maintaining updated security protocols.

As the landscape of cyber threats continues to evolve, it is imperative for enterprises to remain vigilant against innovations in malicious tactics and to adapt their defenses accordingly. Understanding frameworks such as the MITRE ATT&CK Matrix can provide valuable context on potential attack methods and help organizations prepare for and mitigate risks associated with sophisticated malware attacks like QBot.

Source link