QakBot: dangerous banking trojan returns with new tricks
QakBot – a Banking Trojan and Botnet Operating Since 2008
QakBot, also known as QBot, is a malicious computer program that has been a serious threat to network users since 2008. It is a banking trojan and botnet that has evolved over time, becoming increasingly dangerous and difficult to detect.
Operation Duck Hunt – Disabling QakBot Servers
Servers associated with QakBot were recently shut down as a result of a legal operation named Operation Duck Hunt. These actions aimed to limit the damages caused by this malicious botnet and enhance cybersecurity.
Return of the QakBot Botnet with a New Persistence Mechanism
Threat researchers at Binary Defense have discovered the resurgence of the QakBot botnet, now utilizing a new persistence mechanism. This marks a significant evolution of this malicious software, making it even more challenging to combat.
QakBot Distribution Methods and Capabilities
QakBot is typically distributed through phishing campaigns with various themes, such as malicious document attachments or links to download harmful files. From a banking trojan, QakBot has evolved into a sophisticated tool with a wide range of functions, including data gathering, ransomware delivery, and attacks on critical infrastructure.
Scale of Infection and QakBot Operations
Following the shutdown of QakBot servers in 2023, more than 700,000 computers were identified as part of this botnet. The latest variants of QakBot evade detection through diverse methods, posing challenges for network security professionals combating them.
New Masking Techniques and Operational Strategies of QakBot
QakBot masquerades as an Adobe Reader installer and utilizes srtasks.exe to establish persistence after a factory reset. Additionally, it initiates additional processes using msiexec.exe, making it even more difficult to detect.
Appendix A: Detecting QakBot and Attack Methodology
In line with the significant information provided in Appendix A of the article, detecting QakBot and understanding its attack methodology is a key element in preventing its adverse impacts on computer systems.