May 6, 2019 By David Bisson 2 min read

Security researchers observed recent Qbot attack campaigns using a new persistence mechanism that helps the banking Trojan avoid detection.

In early April, Cisco Talos observed a new Qbot campaign that infected users’ machines with a dropper. The campaign used the infected machine to create a scheduled task that executed a JavaScript downloader. This asset, in turn, made a request from one of several hijacked domains.

Specifically, the downloader requested the uniform resource identifier (URI) /datacollectionservice[.]php3 from the domains, which were XOR-encrypted at the beginning of the JavaScript. A successful communication attempt yielded obfuscated data that the campaign saved in two files: the first 1,000 characters in (randalpha)_1.zzz and the remainder in (randalpha)_2.zzz.

At that point, the campaign created a scheduled task designed to execute a batch file. This process used the two .zzz files to assemble a Qbot executable before deleting them. Finally, the campaign ran the malware payload, enabling it to target financial information on the infected machine.

Tracing the Attack Trail of Qbot

Qbot has gotten up to all kinds of trouble over the past few years. Back in 2017, IBM X-Force observed a campaign in which the malware (also known as Qakbot) locked hundreds of thousands of Active Directory users out of their company’s domain, preventing them from accessing their employer’s servers or network assets.

Fast-forward to 2019: In March, Varonis spotted an operation leveraging a new variant of the malware that compromised and took over thousands of victims around the world. That same month, the SANS Internet Storm Center (ISC) discovered a malspam campaign in which Emotet served up Qbot as its follow-up payload.

Use UEM and AI to Defend Against Sophisticated Malware

Security professionals can help their organizations defend against sophisticated malware like Qbot by using a unified endpoint management (UEM) solution to monitor how devices report to the environment and take the necessary precautions if anything appears to be malicious in nature. Organizations should also consider enlisting the help of artificial intelligence (AI) to help fill the defense gaps created by rule-based security tools.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today