New QBot Banking Trojan Campaign Hijacks Business Emails to Spread Malware

Share:

A new QBot malware campaign is leveraging hijacked business correspondence to trick unsuspecting victims into installing the malware, new findings from Kaspersky reveal.

The latest activity, which commenced on April 4, 2023, has primarily targeted users in Germany, Argentina, Italy, Algeria, Spain, the U.S., Russia, France, the U.K., and Morocco.

QBot (aka Qakbot or Pinkslipbot) is a banking trojan that’s known to be active since at least 2007. Besides stealing passwords and cookies from web browsers, it doubles up as a backdoor to inject next-stage payloads such as Cobalt Strike or ransomware.

Distributed via phishing campaigns, the malware has seen constant updates during its lifetime that pack in anti-VM, anti-debugging, and anti-sandbox techniques to evade detection. It has also emerged as the most prevalent malware for the month of March 2023, per Check Point.

“Early on, it was distributed through infected websites and pirated software,” Kaspersky researchers said, explaining QBot’s distribution methods. “Now the banker is delivered to potential victims through malware already residing on their computers, social engineering, and spam mailings.”

Email thread hijacking attacks are not new. It occurs when cybercriminals insert themselves into existing business conversations or initiate new conversations based on information previously gleaned by compromised email accounts.

The goal is to entice victims into opening malicious links or malicious attachments, in this case, an enclosed PDF file that masquerades as a Microsoft Office 365 or Microsoft Azure alert.

Opening the document leads to the retrieval of an archive file from an infected website that, in turn, contains an obfuscated Windows Script File (.WSF). The script, for its part, incorporates a PowerShell script that downloads malicious DLL from a remote server. The downloaded DLL is the QBot malware.

The findings come as Elastic Security Labs unearthed a multi-stage social engineering campaign that employs weaponized Microsoft Word documents to distribute Agent Tesla and XWorm by means of a custom .NET-based loader.

 

(c) Ravie Lakshmanan

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
12:09 am, Jun 3, 2025
weather icon 13°C
L: 12° | H: 14°
few clouds
Humidity: 61 %
Pressure: 1012 mb
Wind: 8 mph SSW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 19%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:47 am
Sunset: 9:10 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
12° | 14°°C 1 mm 100% 16 mph 92 % 1013 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
10° | 17°°C 0.47 mm 47% 12 mph 84 % 1009 mb 0 mm/h
Thu Jun 05 10:00 pm
weather icon
12° | 19°°C 0.76 mm 76% 12 mph 88 % 1008 mb 0 mm/h
Fri Jun 06 10:00 pm
weather icon
12° | 17°°C 1 mm 100% 11 mph 96 % 1008 mb 0 mm/h
Sat Jun 07 10:00 pm
weather icon
11° | 18°°C 1 mm 100% 18 mph 95 % 1007 mb 0 mm/h
Today 1:00 am
weather icon
13° | 13°°C 0 mm 0% 9 mph 61 % 1013 mb 0 mm/h
Today 4:00 am
weather icon
13° | 13°°C 0 mm 0% 11 mph 66 % 1012 mb 0 mm/h
Today 7:00 am
weather icon
14° | 15°°C 0 mm 0% 14 mph 67 % 1010 mb 0 mm/h
Today 10:00 am
weather icon
16° | 16°°C 0 mm 0% 16 mph 76 % 1007 mb 0 mm/h
Today 1:00 pm
weather icon
14° | 14°°C 1 mm 100% 14 mph 92 % 1007 mb 0 mm/h
Today 4:00 pm
weather icon
14° | 14°°C 1 mm 100% 9 mph 89 % 1007 mb 0 mm/h
Today 7:00 pm
weather icon
16° | 16°°C 1 mm 100% 8 mph 58 % 1007 mb 0 mm/h
Today 10:00 pm
weather icon
14° | 14°°C 0 mm 0% 7 mph 59 % 1009 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€92,589.41
0.03%
Ethereum(ETH)
€2,263.05
1.72%
Tether(USDT)
€0.88
0.00%
XRP(XRP)
€1.92
0.72%
Solana(SOL)
€137.03
-0.52%
USDC(USDC)
€0.88
0.00%
Dogecoin(DOGE)
€0.170792
0.55%
Shiba Inu(SHIB)
€0.000011
1.48%
Pepe(PEPE)
€0.000011
3.55%
Peanut the Squirrel(PNUT)
€0.238484
2.18%
Scroll to Top