New QBot Banking Trojan Campaign Exploits Business Emails to Distribute Malware
April 17, 2023
Financial Security / Malware
Recent research from Kaspersky has unveiled a new initiative utilizing the QBot banking Trojan to compromise business email communications as a method to disseminate malware. This latest campaign began on April 4, 2023, and has notably focused its efforts on targeted users across several countries, including Germany, Argentina, Italy, Algeria, Spain, the United States, Russia, France, the United Kingdom, and Morocco.
QBot, sometimes referred to as Qakbot or Pinkslipbot, has been operational since at least 2007, and its primary function is to extract sensitive information such as passwords and cookies from victims’ web browsers. Furthermore, QBot serves as a backdoor that allows for the deployment of subsequent payloads, including advanced tools like Cobalt Strike and various ransomware variants.
The malware continues to evolve, with recent updates incorporating sophisticated techniques designed to evade detection mechanisms. Specifically, it employs anti-VM, anti-debugging, and anti-sandbox methodologies to complicate analysis and hinder counteract measures by security professionals. Kaspersky notes that QBot has also been recognized as one of the most prevalent forms of malware in March 2023, according to Check Point’s findings.
Phishing campaigns remain the primary vector for distributing QBot. This approach leverages the trust inherent in business communication to lure unsuspecting victims into executing malicious payloads unknowingly. The success of these campaigns can be attributed to the perceived legitimacy of the emails, which often appear as routine business communications.
In terms of adversary tactics and techniques, the initial access for this campaign likely stems from targeted phishing efforts intended to entice users into downloading malware-laden attachments or clicking on malicious links. The deployment of QBot takes advantage of various vulnerabilities to ensure persistence on infected systems and may use privilege escalation techniques to gain further access to sensitive data.
The breadth of QBot’s target demographic highlights a significant concern for business owners, particularly in sectors reliant on effective digital communication. Recognizing such threats underscores the importance of implementing robust cybersecurity measures, including employee training on recognizing phishing attempts and maintaining updated security protocols.
As the landscape of cyber threats continues to evolve, it is imperative for enterprises to remain vigilant against innovations in malicious tactics and to adapt their defenses accordingly. Understanding frameworks such as the MITRE ATT&CK Matrix can provide valuable context on potential attack methods and help organizations prepare for and mitigate risks associated with sophisticated malware attacks like QBot.