Malspam campaigns distributing QakBot on the rise
Ransomware as a service is also becoming increasingly accessible via social media
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Security researchers have warned that the hackers behind the QakBot (aka Qbot) Trojan are collaborating with major ransomware groups to allow access to compromised enterprise networks for secondary attacks.
According to NTT Group’s 2020 Global Threat Intelligence Report, it identified the malware throughout compromised networks during incident response engagements.
Dan Saunders, senior incident response consultant at NTT, said that the malware’s appearance followed successful privilege escalation and lateral movement using harvested compromised credentials. The malware also has a connection with DoppelPaymer.
“This is of significance, as at this stage, in parallel within the network traffic, we observed command and control (C2) infrastructure communication associated with DoppelPaymer,” said Saunders.
“Cobalt Strike beacons were subsequently created on domain controllers, not only reverse-shells in memory but also leveraging admin shares to host the beacons in binary form and perform lateral movement.”
He added that this enables DoppelPaymer to carry out domain discovery to gather target information, identify backup servers to prevent restoration, target file servers for data exfiltration, and encrypt the victim’s data for impact.
“In the end, the victim is left with a substantial ransom demand, or face having their data permanently locked, sold on the dark web or published,” Saunders said.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Saunders said organizations can mitigate the malware by scanning URLs embedded into emails from external domains for malicious indicators. They can also block VBScripts and JavaScripts from launching downloaded executables.
The report also found that ransomware as a service (RaaS) has become increasingly accessible via social media and open sources.
According to the report: “Several threat actors have recently taken to popular social media and open sources like YouTube, Vimeo, and Sellix to advertise and demonstrate their discount-priced USD 40 ransomware as a service (RaaS) builder called ZagreuS.”
RELATED RESOURCE
Ransomware resiliency: The risks associated with an attack and the reward of recovery planning
An overview of the history of ransomware, its potential impact, and best practices to protect IT systems
Several interested buyers left comments on the sale posts on underground forums. They asked if anyone had tested the ZagreuS builder and expressed interest in trying it out.
“Typically, in these instances, the low price of the builder is an indication that the seller lacks experience or that the tool isn’t very valuable,” the report said.
The report also said that phishing continued to be a prominent threat vector, and the Playstation 5’s launch has been an effective lure.
“In the final quarter of 2020, users can assume that any email which includes ‘vaccine’ or ‘PlayStation 5’ in the subject line has a high probability of being fraudulent, just as emails which include unsolicited or unexpected links to DocuSign or DrobBox,” said Jon Heimerl, senior manager, Global Threat Intelligence Center, US at NTT.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
Anthropic promises ‘Opus-level’ reasoning with new Claude Sonnet 4.6 modelNews The latest addition to the Claude family is explicitly intended to power AI agents, with pricing and capabilities designed to attract enterprise attention
-
Researchers call on password managers to beef up defensesNews Analysts at ETH Zurich called for cryptographic standard improvements after a host of password managers were found lacking
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
-
Cybersecurity experts face 20 years in prison following ransomware campaignTwo men used their tech expertise to carry out ALPHV BlackCat ransomware attacks
