Company
Date Published
Author
QakBot
Word count
2821
Language
English
Hacker News points
None

Summary

The blog post from CrowdStrike provides a detailed analysis of the QakBot malware, a sophisticated eCrime banking trojan with a history of evolving capabilities and a notable resurgence in deployment since April 2020. QakBot spreads through networks using worm-like functionalities, exploiting network shares and Active Directory accounts, and employs robust anti-analysis techniques to evade detection. The post highlights a new delivery tactic using Microsoft Word documents with malicious macros sent via email, which execute a Visual Basic Script to download malware. CrowdStrike's Falcon Complete team effectively detects and prevents QakBot infections, focusing on obfuscation techniques used by threat actors to hinder analysis and detailing the infection chain. The team emphasizes the importance of breaking down these obfuscations to identify all indicators of compromise, aiding in the prevention and remediation of potential breaches while enhancing organizational cybersecurity posture against such evolving threats.