IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Malspam campaigns distributing QakBot on the rise

Ransomware as a service is also becoming increasingly accessible via social media

Security researchers have warned that the hackers behind the QakBot (aka Qbot) Trojan are collaborating with major ransomware groups to allow access to compromised enterprise networks for secondary attacks.

According to NTT Group’s 2020 Global Threat Intelligence Report, it identified the malware throughout compromised networks during incident response engagements.

Dan Saunders, senior incident response consultant at NTT, said that the malware’s appearance followed successful privilege escalation and lateral movement using harvested compromised credentials. The malware also has a connection with DoppelPaymer.

“This is of significance, as at this stage, in parallel within the network traffic, we observed command and control (C2) infrastructure communication associated with DoppelPaymer,” said Saunders.

“Cobalt Strike beacons were subsequently created on domain controllers, not only reverse-shells in memory but also leveraging admin shares to host the beacons in binary form and perform lateral movement.”

He added that this enables DoppelPaymer to carry out domain discovery to gather target information, identify backup servers to prevent restoration, target file servers for data exfiltration, and encrypt the victim’s data for impact.

“In the end, the victim is left with a substantial ransom demand, or face having their data permanently locked, sold on the dark web or published,” Saunders said.

Saunders said organizations can mitigate the malware by scanning URLs embedded into emails from external domains for malicious indicators. They can also block VBScripts and JavaScripts from launching downloaded executables.

The report also found that ransomware as a service (RaaS) has become increasingly accessible via social media and open sources.

According to the report: “Several threat actors have recently taken to popular social media and open sources like YouTube, Vimeo, and Sellix to advertise and demonstrate their discount-priced USD 40 ransomware as a service (RaaS) builder called ZagreuS.”

Related Resource

Ransomware resiliency: The risks associated with an attack and the reward of recovery planning

An overview of the history of ransomware, its potential impact, and best practices to protect IT systems

How to defend against ransomware - free guide to ransomware from VeritasDownload now

Several interested buyers left comments on the sale posts on underground forums. They asked if anyone had tested the ZagreuS builder and expressed interest in trying it out. 

“Typically, in these instances, the low price of the builder is an indication that the seller lacks experience or that the tool isn’t very valuable,” the report said.

The report also said that phishing continued to be a prominent threat vector, and the Playstation 5’s launch has been an effective lure.

“In the final quarter of 2020, users can assume that any email which includes ‘vaccine’ or ‘PlayStation 5’ in the subject line has a high probability of being fraudulent, just as emails which include unsolicited or unexpected links to DocuSign or DrobBox,” said Jon Heimerl, senior manager, Global Threat Intelligence Center, US at NTT.

Featured Resources

Activation playbook: Deliver data that powers impactful, game-changing campaigns

Bringing together data and technology to drive better business outcomes

Free Download

In unpredictable times, a data strategy is key

Data processes are crucial to guide decisions and drive business growth

Free Download

Achieving resiliency with Everything-as-a-Service (XAAS)

Transforming the enterprise IT landscape

Free Download

What is contextual analytics?

Creating more customer value in HR software applications

Free Download

Recommended

Protecting healthcare from cybercrime
Whitepaper

Protecting healthcare from cybercrime

25 May 2022
The truth about cyber security training
Whitepaper

The truth about cyber security training

25 Apr 2022
The truth about cyber security training
Whitepaper

The truth about cyber security training

25 Apr 2022
The Total Economic Impact™ of Mimecast
Whitepaper

The Total Economic Impact™ of Mimecast

25 Apr 2022

Most Popular

Open source packages with millions of installs hacked to harvest AWS credentials
hacking

Open source packages with millions of installs hacked to harvest AWS credentials

24 May 2022
Nvidia pauses hiring to help cope with inflation
Careers & training

Nvidia pauses hiring to help cope with inflation

23 May 2022
Europe's first autonomous petrol station opens in Lisbon
automation

Europe's first autonomous petrol station opens in Lisbon

23 May 2022