Uncategorized

Updated QBot malware variants discovered

New variants of the QBot malware, also known as Qakbot, have emerged since mid-December despite having been disrupted in August, suggesting continuous testing by the malware developer, BleepingComputer reports. Sophos X-Ops researchers discovered that QBot samples deployed in December and January were distributed via a Microsoft Software Installer executable. Improved obfuscation techniques have also been integrated into the new iterations of the malware, which have been using sophisticated AES-256 encryption alongside older versions' XOR technique. Further examination of a new QBot variant revealed that execution on Windows systems triggered a fraudulent Adobe installation prompt in the targeted system, which launches the malware regardless of the popup option clicked. Such a development comes after QBot was reported by Microsoft to be involved in a December phishing campaign spoofing the Internal Revenue Service. Cisco Talos also noted a Qakbot campaign that remained active in October due to the continued operations of the malware's spam delivery infrastructure following the takedown.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds