April 8, 2024, 9:04 a.m. | Guru Baran

Cyber Security News cybersecuritynews.com

Law enforcement dismantled the Qakbot botnet’s servers in 2023’s Operation Duck Hunt, but researchers identified its reemergence with a modified DLL, which utilizes the srtasks.exe process for persistence, ensuring its survival on restarted machines.  Qakbot continues to spread via phishing campaigns with various lures, including attachments or links that deliver the malware upon user interaction.  […]


The post Meet The New Qakbot DLL That Abuses Windows Process For persistence appeared first on Cyber Security News.

attachments botnet campaigns cyber security dismantled dll duck duck hunt enforcement hunt law law enforcement links machines malware persistence phishing phishing campaigns process qakbot qakbot botnet qakbot malware researchers servers survival windows

More from cybersecuritynews.com / Cyber Security News

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)