Malware Reads Emails 30 Minutes After Infecting Device

Share post:

Qbot, an old software threat notorious for infecting Windows PCs via phishing emails and Outlook bugs, has been improved to contain malware that is able to read the emails of its victims.

This latest capability allows Qbot to improve the message’s apparent legitimacy to potential victims.

Operators of the malware rely on clickable phishing messages, such as tax reminders, job offers, and COVID-19 notifications. They can commit data theft from Chrome, Edge, email and online bank passwords.

Researchers saw a case where initial access wasn’t known but likely delivered through a tainted Microsoft Excel document that was configured to download malware from a web page.

Qbot operators use legitimate Microsoft tools to raid a whole network within 30 minutes of the victim clicking on a link in the Excel sheet.

Qbot’s most recent foray into malware had infected 65% more PCs in the six months to July 2021 than the year before. Microsoft highlighted the malware for its modular design, making it very difficult to detect.

The malware hides malicious processes and creates scheduled tasks to perpetuate itself on a machine. Once it successfully infects a device, it uses various techniques for lateral movement.

The FBI has issued a warning that Qbot trojans are being used to distribute ProLock, a “human-operated ransomware.”

For more information, read the original story in ZDNet.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways