QBot: New Wave of Activity Targets Enterprises 

Kaspersky_news

Share post

After a hiatus, a malicious email campaign is back targeting businesses with the dangerous QBot malware. Kaspersky has identified a new wave of activity affecting more than 1.500 users since September 28, 2022.

The most frequently attacked countries with QBot on companies include the USA with 193 affected users, followed by Italy with 151 affected users, Germany with 93 affected users and India with 74 affected (as of October 4, 2022). Austria and Switzerland are also affected with 17 and 14 cases respectively. Kaspersky has so far detected more than 400 infected websites distributing QBot.

Banking Trojan QBot is looking for sources of money

QBot is a notorious banking trojan that steals user data and emails from infected corporate networks, spreads further within the network and can install ransomware from other trojans on additional devices in the network. Cyber ​​criminals supposedly intercept active business-related email conversations and send recipients a message with a link to an archived file with a password to download in order to infect their devices with a banking Trojan. In order to convince users to open or download the file, cyber criminals usually claim that it contains important information, such as an offer.

Victoria Vlasova, senior security researcher at Kaspersky, explains: “The impersonation of work correspondence is a common trick used by cybercriminals, but this campaign is more complicated. This is because the attackers record a current conversation and insert themselves into it. This method makes such messages much more difficult to spot — and increases the likelihood that the recipient will open the files. Employees should therefore now be particularly careful when communicating in business correspondence in order not to accidentally open a malicious file with QBot.”

More at Kaspersky.com

 


About Kaspersky

Kaspersky is an international cybersecurity company founded in 1997. Kaspersky's in-depth threat intelligence and security expertise serve as the basis for innovative security solutions and services to protect companies, critical infrastructures, governments and private users worldwide. The company's comprehensive security portfolio includes leading endpoint protection as well as a range of specialized security solutions and services to defend against complex and evolving cyber threats. Kaspersky technologies protect over 400 million users and 250.000 corporate customers. More information about Kaspersky can be found at www.kaspersky.com/


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more