New QBot Banking Trojan Campaign Hijacks Business Emails to Spread Malware

Teilen:

A new QBot malware campaign is leveraging hijacked business correspondence to trick unsuspecting victims into installing the malware, new findings from Kaspersky reveal.

The latest activity, which commenced on April 4, 2023, has primarily targeted users in Germany, Argentina, Italy, Algeria, Spain, the U.S., Russia, France, the U.K., and Morocco.

QBot (aka Qakbot or Pinkslipbot) is a banking trojan that’s known to be active since at least 2007. Besides stealing passwords and cookies from web browsers, it doubles up as a backdoor to inject next-stage payloads such as Cobalt Strike or ransomware.

Distributed via phishing campaigns, the malware has seen constant updates during its lifetime that pack in anti-VM, anti-debugging, and anti-sandbox techniques to evade detection. It has also emerged as the most prevalent malware for the month of March 2023, per Check Point.

“Early on, it was distributed through infected websites and pirated software,” Kaspersky researchers said, explaining QBot’s distribution methods. “Now the banker is delivered to potential victims through malware already residing on their computers, social engineering, and spam mailings.”

Email thread hijacking attacks are not new. It occurs when cybercriminals insert themselves into existing business conversations or initiate new conversations based on information previously gleaned by compromised email accounts.

The goal is to entice victims into opening malicious links or malicious attachments, in this case, an enclosed PDF file that masquerades as a Microsoft Office 365 or Microsoft Azure alert.

Opening the document leads to the retrieval of an archive file from an infected website that, in turn, contains an obfuscated Windows Script File (.WSF). The script, for its part, incorporates a PowerShell script that downloads malicious DLL from a remote server. The downloaded DLL is the QBot malware.

The findings come as Elastic Security Labs unearthed a multi-stage social engineering campaign that employs weaponized Microsoft Word documents to distribute Agent Tesla and XWorm by means of a custom .NET-based loader.

 

(c) Ravie Lakshmanan

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
7:41 pm, Juni 1, 2025
Wetter-Symbol 19°C
L: 18° | H: 20°
overcast clouds
Luftfeuchtigkeit: 56 %
Druck: 1013 mb
Wind: 15 mph WSW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 91%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:49 am
Sonnenuntergang: 9:07 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
18° | 20°°C 0 mm 0% 8 mph 60 % 1013 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
11° | 21°°C 0 mm 0% 11 mph 79 % 1019 mb 0 mm/h
Di. Juni 03 10:00 pm
Wetter-Symbol
11° | 19°°C 1 mm 100% 16 mph 93 % 1014 mb 0 mm/h
Mi. Juni 04 10:00 pm
Wetter-Symbol
10° | 20°°C 0 mm 0% 13 mph 80 % 1010 mb 0 mm/h
Do. Juni 05 10:00 pm
Wetter-Symbol
12° | 18°°C 1 mm 100% 13 mph 95 % 1008 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
16° | 18°°C 0 mm 0% 8 mph 60 % 1013 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
13° | 15°°C 0 mm 0% 6 mph 75 % 1014 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 5 mph 79 % 1016 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 9 mph 72 % 1018 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
16° | 16°°C 0 mm 0% 7 mph 51 % 1019 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
19° | 19°°C 0 mm 0% 8 mph 35 % 1018 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
21° | 21°°C 0 mm 0% 7 mph 30 % 1017 mb 0 mm/h
Tomorrow 7:00 pm
Wetter-Symbol
19° | 19°°C 0 mm 0% 11 mph 40 % 1015 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€92,458.82
0.33%
Ethereum(ETH)
€2,225.52
-0.50%
Fesseln(USDT)
€0.88
0.00%
XRP(XRP)
€1.90
-1.28%
Solana(SOL)
€137.30
-0.35%
USDC(USDC)
€0.88
0.00%
Dogecoin(DOGE)
€0.169526
-0.21%
Shiba Inu(SHIB)
€0.000011
1.31%
Pepe(PEPE)
€0.000011
1.13%
Peanut das Eichhörnchen(PNUT)
€0.230056
0.88%
Nach oben scrollen