QakBot malware poses a high security risk

QakBot attack XML

Share post

The QakBot malware harbors a high security risk due to the often low detection rate. QakBot is distributed through XLSB files, making it difficult to spot.

Qakbot is not new to malware, but the Hornetsecurity Security Lab is now warning of a new type of distribution: IT security experts have discovered that XLM macros are used in XLSB documents to distribute QakBot malware. Since both XLM macros and the XLSB document format are uncommon, these new malicious documents have a very low detection rate by current anti-virus solutions.

What is QakBot?

QakBot (also known as QBot, QuakBot, Pinkslipbot) has been around since 2008. The malware is distributed via Emotet by Emotet downloading the QakBot loader from infected victims. QakBot is also distributed directly via email. For this purpose, e-mail conversation thread hijacking is used in the campaigns - i.e. e-mails that are found in the mailboxes of the victims are replied to. QakBot is also known to escalate attacks by downloading the ProLock ransomware.

Why are the attacks not recognized?

Hornetsecurity QakBot process attack

Sequence of a QakBot attack via XLM macros in XLSB documents. Info: Hornetsecurity Security Labs (click to enlarge)

XLSB is a binary Excel workbook format, the main purpose of which is to make reading and writing to the file faster and to reduce the size of very complex spreadsheets. However, with current computing power and memory availability, the need for this binary format has decreased and is rarely used today.
According to the experts at the Hornetsecurity Security Lab, the combination with the old and also not very frequently recognized XLM macros means that the current documents are not identified as harmful by any of the antivirus solutions listed on VirusTotal.

Camouflaged in a ZIP file

The QakBot XLSB files are distributed in an attached ZIP file. This ZIP file contains the XLSB document which, when opened, pretends to be a DocuSign encrypted document. The user must "Enable Editing" and "Enable Content" to decrypt it.
The URL is composed using the XLM macro and simulates the download of a PNG file.
In reality, however, the PNG file is the QakBot loader's executable file.

What can be done about this attack method?

  • Most antivirus solutions focus on modern VBA macro malware, but often fail to detect re-emerging old and now less common XLM macros and XLSB documents.
  • Companies should therefore rely on advanced security services that are able to react to new threats and attack methods in the shortest possible time.

The security experts from the Hornetsecurity Security Lab provide a detailed analysis of this attack method on their blog.

More on this at HornetSecurity.com

 


About Hornetsecurity

Hornetsecurity is the leading German cloud security provider for e-mail in Europe and protects the IT infrastructure, digital communication and data of companies and organizations of all sizes. The security specialist from Hanover provides its services via 10 redundantly secured data centers around the world. The product portfolio includes all important areas of e-mail security, from spam and virus filters to legally compliant archiving and encryption, to defense against CEO fraud and ransomware. Hornetsecurity has around 200 employees at 12 locations around the world and operates with its international dealer network in more than 30 countries.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more