Cisco Blog >Threat Research

Threat Research

The post was authored by Ben Baker.

Qbot, AKA Qakbot, has been around for since at least 2008, but it recently experienced a large surge in development and deployments. Qbot primarily targets sensitive information like banking credentials. Here we are unveiling recent changes to the malware that haven't been made public yet.

Qbot's primary means of infection is as a payload in browser exploit kits. Website administrators often use FTP to access their servers, so Qbot attempts to steal FTP credentials to add these servers to its malware hosting infrastructure. Qbot can also spread across a network using SMB, which makes it very difficult to remove from an unprotected network.

Read More>>

Tags:

Cisco Systems Inc. issued this content on 28 April 2016 and is solely responsible for the information contained herein. Distributed by Public, unedited and unaltered, on 29 April 2016 14:50:26 UTC

Original Document: http://blogs.cisco.com/security/talos/research-spotlight-the-resurgence-of-qbot