QakBot Malware Resurfaces with New Tactics Targeting the Hospitality Industry

More than three months after the QakBot malware was deconstructed through an infiltration of its command-and-control (C2) network as part of an enforcement operation, a fresh wave of phishing messages propagating the malware has been noticed.

The finding was made by Microsoft, which identified it as a low-volume campaign that started on December 11, 2023, and was directed towards the hospitality sector.

Targets stated in a series of tweets made on X (previously Twitter) that it had received a PDF from a user posing as an IRS employee. A URL to download a digitally signed Windows Installer (.msi) was included in the PDF. Qakbot was called through export read more QakBot Malware Resurfaces with New Tactics Targeting the Hospitality Industry.

Get up to date on the latest cybersecurity news and enhance your knowledge of cybersecurity with our thorough coverage of the dangers, breaches, and solutions.

Leave a Reply

Your email address will not be published. Required fields are marked *