New QBot Banking Trojan Campaign Hijacks Business Emails to Spread Malware

Share:

A new QBot malware campaign is leveraging hijacked business correspondence to trick unsuspecting victims into installing the malware, new findings from Kaspersky reveal.

The latest activity, which commenced on April 4, 2023, has primarily targeted users in Germany, Argentina, Italy, Algeria, Spain, the U.S., Russia, France, the U.K., and Morocco.

QBot (aka Qakbot or Pinkslipbot) is a banking trojan that’s known to be active since at least 2007. Besides stealing passwords and cookies from web browsers, it doubles up as a backdoor to inject next-stage payloads such as Cobalt Strike or ransomware.

Distributed via phishing campaigns, the malware has seen constant updates during its lifetime that pack in anti-VM, anti-debugging, and anti-sandbox techniques to evade detection. It has also emerged as the most prevalent malware for the month of March 2023, per Check Point.

“Early on, it was distributed through infected websites and pirated software,” Kaspersky researchers said, explaining QBot’s distribution methods. “Now the banker is delivered to potential victims through malware already residing on their computers, social engineering, and spam mailings.”

Email thread hijacking attacks are not new. It occurs when cybercriminals insert themselves into existing business conversations or initiate new conversations based on information previously gleaned by compromised email accounts.

The goal is to entice victims into opening malicious links or malicious attachments, in this case, an enclosed PDF file that masquerades as a Microsoft Office 365 or Microsoft Azure alert.

Opening the document leads to the retrieval of an archive file from an infected website that, in turn, contains an obfuscated Windows Script File (.WSF). The script, for its part, incorporates a PowerShell script that downloads malicious DLL from a remote server. The downloaded DLL is the QBot malware.

The findings come as Elastic Security Labs unearthed a multi-stage social engineering campaign that employs weaponized Microsoft Word documents to distribute Agent Tesla and XWorm by means of a custom .NET-based loader.

 

(c) Ravie Lakshmanan

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
11:44 am, Jun 1, 2025
weather icon 19°C
L: 17° | H: 20°
few clouds
Humidity: 53 %
Pressure: 1014 mb
Wind: 14 mph W
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 20%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:49 am
Sunset: 9:07 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
17° | 20°°C 0 mm 0% 14 mph 70 % 1014 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
11° | 21°°C 0 mm 0% 10 mph 82 % 1019 mb 0 mm/h
Tue Jun 03 10:00 pm
weather icon
11° | 17°°C 1 mm 100% 16 mph 92 % 1013 mb 0 mm/h
Wed Jun 04 10:00 pm
weather icon
9° | 19°°C 0 mm 0% 13 mph 83 % 1010 mb 0 mm/h
Thu Jun 05 10:00 pm
weather icon
11° | 15°°C 1 mm 100% 13 mph 97 % 1009 mb 0 mm/h
Today 1:00 pm
weather icon
18° | 19°°C 0 mm 0% 12 mph 53 % 1014 mb 0 mm/h
Today 4:00 pm
weather icon
16° | 18°°C 0 mm 0% 14 mph 48 % 1014 mb 0 mm/h
Today 7:00 pm
weather icon
15° | 16°°C 0 mm 0% 12 mph 51 % 1013 mb 0 mm/h
Today 10:00 pm
weather icon
16° | 16°°C 0 mm 0% 9 mph 70 % 1014 mb 0 mm/h
Tomorrow 1:00 am
weather icon
13° | 13°°C 0 mm 0% 7 mph 82 % 1016 mb 0 mm/h
Tomorrow 4:00 am
weather icon
11° | 11°°C 0 mm 0% 6 mph 78 % 1017 mb 0 mm/h
Tomorrow 7:00 am
weather icon
12° | 12°°C 0 mm 0% 9 mph 72 % 1018 mb 0 mm/h
Tomorrow 10:00 am
weather icon
16° | 16°°C 0 mm 0% 8 mph 48 % 1019 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€91,611.95
0.54%
Ethereum(ETH)
€2,198.02
-1.17%
Tether(USDT)
€0.88
0.00%
XRP(XRP)
€1.89
-0.14%
Solana(SOL)
€133.39
-1.51%
USDC(USDC)
€0.88
0.00%
Dogecoin(DOGE)
€0.165655
0.02%
Shiba Inu(SHIB)
€0.000011
2.16%
Pepe(PEPE)
€0.000010
0.91%
Peanut the Squirrel(PNUT)
€0.225961
2.71%
Scroll to Top