YourAnonRiots, to Cybersecurity Japanese

🚨 Bumblebee, , Zloader, & are back, targeting U.S. organizations with sophisticated phishing tactics.

https://thehackernews.com/2024/02/bumblebee-malware-returns-with-new.html

Be wary of suspicious emails or downloads – these threats are sneakier than ever.

spamhaus, to random

🦆🤖 Qakbot makes a return....a not-so-welcome Christmas present!

Spamhaus researchers are observing low-volume Qakbot campaigns targeting specific business sectors. But, we do have some positive news....

Many of the observed botnet controllers are now offline, and the remaining ones are already known as rogue ISPs, and listed on the Spamhaus Extended DROP List 👉 https://www.spamhaus.org/drop/

👀 Watch this space; if anything changes, we'll keep you updated!

YourAnonRiots, to microsoft Japanese

🚨Alert: is back!

discovered a low-volume campaign targeting the hospitality industry, masquerading as IRS employees.

https://thehackernews.com/2023/12/qakbot-malware-resurfaces-with-new.html

YourAnonRiots, to Cybersecurity Japanese

Excel add-ins can be more than just productivity tools.

DarkGate and have emerged after the fall of , using similar malicious tactics.

https://thehackernews.com/2023/11/darkgate-and-pikabot-malware-resurrect.html

YourAnonRiots, to Cybersecurity Japanese

New high-volume phishing campaigns mimic tactics of defunct trojan, hijacking email threads and using unique URLs to deliver DarkGate and PikaBot .

https://thehackernews.com/2023/11/darkgate-and-pikabot-malware-resurrect.html

malware_traffic, to random

This article from @TalosSecurity is wrong: https://infosec.exchange/@TalosSecurity@mstdn.social/111182485199499672

The activity reported in this Talos article is not associated with .

Why do I say this?

This Talos article is "...connecting the metadata in the LNK files used in the new campaign to the machines used in previous Qakbot campaigns."

Talos identifies these campaigns as "AA" and "BB." But the other data Talos presents isn't associated with infrastructure for the "AA" and "BB" campaigns that have pushed Qakbot before.

That "AA" and "BB" infrastructure has been active since last month, pushing , , and . This distribution network is run by a threat actor Proofpoint identifies as . TA577 was one of the distributors of Qakbot before Qakbot got taken down.

I would never have called TA577 the threat actor behind Qakbot, but Talos implies this in the article. TA577 is merely a threat actor that distributed Qakbot tagged as part of the "AA" and "BB" series campaigns.

From what I can tell, this Knight ransomeware activity is not connected with the AA/BB/TA577 distributor who has previously spread Qakbot and other malware.

TalosSecurity, to random
@TalosSecurity@mstdn.social avatar

The actors behind the malware are still active, despite a recent takedown announcement from the FBI. Talos research found a new malware they're spreading, including a and backdoor via phishing emails https://blog.talosintelligence.com/qakbot-affiliated-actors-distribute-ransom/

bsi, to random German
@bsi@social.bund.de avatar
0x58, to Cybersecurity

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #35/2023 is out! It includes the following and much more:

➝ 🔓 🏌🏻‍♂️Golf gear giant #Callaway data breach exposes info of 1.1 million
➝ 🔓👕 Forever 21 data breach affects half a million people
➝ 🔓 🤦🏻‍♂️ #LogicMonitor customers hit by hackers, because of default passwords
➝ 🇺🇸 ⚖️ Lawsuit Accuses University of Minnesota of Not Doing Enough to Prevent #DataBreach
➝ 🎬 🔓 #Paramount discloses data breach following security incident
➝ 🏥 🔓 #Healthcare Organizations Hit by Cyberattacks Last Year Reported Big Impact, Costs
➝ 🇺🇸 🌎 #Microsoft joins a growing chorus of organizations criticizing a #UN cybercrime treaty
➝ 🇺🇸 🦠 U.S. Hacks #QakBot, Quietly Removes Botnet Infections
➝ 🇷🇺 🇺🇦 #Russia targets #Ukraine with new Android #backdoor, intel agencies say
➝ 🇷🇺 🕵🏻‍♂️ Unmasking #Trickbot, One of the World’s Top Cybercrime Gangs
➝ 🇨🇳 👀 ‘Earth Estries’ #Cyberespionage Group Targets Government, Tech Sectors
➝ 🇨🇳 Chinese Hacking Group Exploits Barracuda Zero-Day to Target Government, Military, and Telecom
➝ 💸 🇪🇺 Pay our ransom instead of a #GDPR fine, #cybercrime gang tells its targets
➝ 🇺🇸 🇨🇳 #Meta: Pro-Chinese influence operation was the largest in history
➝ 🇪🇸 📸 Spain warns of #LockBit Locker ransomware phishing attacks
➝ 🇵🇱 🚂 Two Men Arrested Following #Poland Railway Hacking
➝ 🇰🇵 🐍 #Lazarus hackers deploy fake #VMware PyPI packages in #VMConnect attacks
➝ 💸 #Classiscam fraud-as-a-service expands, now targets banks and 251 brands
➝ 💬 🎠 Trojanized #Signal and #Telegram apps on Google Play delivered spyware
➝ 🦠 📄 MalDoc in PDFs: Hiding malicious Word docs in PDF files
➝ 🇧🇷 👀 A Brazilian phone #spyware was hacked and victims’ devices ‘deleted’ from server
➝ 👨🏻‍💻 🔐 #GitHub Enterprise Server Gets New Security Capabilities
➝ 🚗 💰 Over $1 Million Offered at New #Pwn2Own #Automotive Hacking Contest
➝ 🩹 #Splunk Patches High-Severity Flaws in Enterprise, IT Service Intelligence
➝ ⛏️ 🔓 Recent #Juniper Flaws Chained in Attacks Following #PoC Exploit Publication

📚 This week's recommended reading is: "Spam Nation: The Inside Story of Organized Cybercrime―from Global Epidemic to Your Front Door" by @briankrebs

Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end ⬇️

https://infosec-mashup.santolaria.net/p/infosec-mashup-week-352023

gleeda, to random

In light of all the news about qakbot being dismantled, it’s time to let people know about something we did at @huntress :
@JohnHammond discusses the qakbot “vaccine” we used to prevent the spread of qakbot in our customer base:

https://www.huntress.com/blog/qakbot-malware-takedown-and-defending-forward

governa, to random
@governa@fosstodon.org avatar
stux, to random
@stux@mstdn.social avatar

Great work from certain parties on taking down the network :blobcathighfive:

I'm sure they didn't get it all but every bit is worth it :nkoHammer:

tagesschau, to random German
@tagesschau@ard.social avatar

Ermittler zerschlagen Schadnetzwerk "Qakbot" in Deutschland

Jahre lang erpressten Hacker über das Botnetzwerk "Qakbot" Unternehmen und Regierungsbehörden. Nun haben Ermittler in einer internationalen Aktion die Server der Schadsoftware übernommen - Schwerpunkt war Deutschland.

➡️ https://www.tagesschau.de/inland/innenpolitik/botnetz-qakbot-zerschlagung-100.html?at_medium=mastodon&at_campaign=tagesschau.de

ericfreyss, to random French
@ericfreyss@mastodon.social avatar

Qakbot botnet infrastructure shattered after international operation

has supported the coordination of a large-scale international operation that has taken down the infrastructure of the malware and led to the seizure of nearly €8M in cryptocurrencies. The international investigation, also supported by Eurojust, involved judicial and law enforcement authorities from FR (Paris DA J3, Gendarmerie and Police), DE, LV, NL, RO, UK and US.

https://www.europol.europa.eu/media-press/newsroom/news/qakbot-botnet-infrastructure-shattered-after-international-operation

janvlug, to linux
@janvlug@mastodon.social avatar

Were there any computers infected by ?

I did not read much about which was targeted, but wat I read is all about and ' s.

https://www.bleepingcomputer.com/news/security/how-the-fbi-nuked-qakbot-malware-from-infected-windows-pcs/

joshlemon, to random

The FBI conducted a take down of the yesterday by taking over the C2 servers and pushing out a new DLL to unload the implant on all infected systems.

Time will tell if we see a reemergence of Qakbot, or something else in its place.

Department of Justice’s statement: https://www.justice.gov/opa/pr/qakbot-malware-disrupted-international-cyber-takedown
Technical write up from Secureworks: https://www.secureworks.com/blog/law-enforcement-takes-down-qakbot

abuse_ch, to random
@abuse_ch@ioc.exchange avatar

Quak 🦆! The FBI and the U.S. Department of Justice announced a multinational operation to disrupt and dismalte the Qakbot botnet 💣 💥 Goodbye , I hope we won't see you ever again 👋. And this is how it looks like from Feodo Tracker' perspective ⬇️. All C2s are offline 🛑

https://feodotracker.abuse.ch/browse/qakbot/

Tango down! 💪

dannotdaniel, to random
@dannotdaniel@mastodon.social avatar

Good news everyone!

The FBI has removed the malware from your computer by installing other software on your computer no wait

w7voa, to random
@w7voa@journa.host avatar
ankit_anubhav, to Cybersecurity
realhackhistory, to cryptocurrency
@realhackhistory@chaos.social avatar

Interesting, US cyber police (along with other authorities) have made a big move against , looks like a takedown of infrastructure, wiping of from infected systems and the retrieval of some , no word on the people behind the botnet itself though.
https://www.justice.gov/usao-cdca/pr/qakbot-malware-disrupted-international-cyber-takedown

andrewbrandt, to random

Last year I was invited to present a talk at a conference called and spoke about a particularly vicious called .

My colleague Steeve and I had cracked the methodology for decoding their command-and-control functionality. We published our work in a blog post and presented it at , , and .

Today, the announced that in an international operation with France, Germany, the Netherlands, Romania, Latvia, and the United Kingdom they have shut down the botnet.

I do this work to help people everywhere.

https://www.fbi.gov/news/stories/fbi-partners-dismantle-qakbot-infrastructure-in-multinational-cyber-takedown

malware_traffic, to random

Tweet I wrote for my employer at the bird site: https://twitter.com/Unit42_Intel/status/1659199751265595392

2023-05-17 (Wednesday): Today, this week's BB28 -style distribution chain pushed instead of Qakbot. Followed up with using . We later saw additional Cobalt Strike traffic over HTTPS. List of IOCs available at https://github.com/pan-unit42/tweets/blob/master/2023-05-17-IOCs-for-Pikabot-with-Cobalt-Strike.txt

A carved of the infection traffic (removed everything not related to the & ) and the associated malware/registry updates available at https://malware-traffic-analysis.net/2023/05/17/index.html

image/jpeg
image/jpeg
image/jpeg

grep_security, to infosec
  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • tacticalgear
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • lostlight
  • All magazines