all InfoSec news
Meet The New Qakbot DLL That Abuses Windows Process For persistence
Cyber Security News cybersecuritynews.com
Law enforcement dismantled the Qakbot botnet’s servers in 2023’s Operation Duck Hunt, but researchers identified its reemergence with a modified DLL, which utilizes the srtasks.exe process for persistence, ensuring its survival on restarted machines. Qakbot continues to spread via phishing campaigns with various lures, including attachments or links that deliver the malware upon user interaction. […]
The post Meet The New Qakbot DLL That Abuses Windows Process For persistence appeared first on Cyber Security News.
attachments botnet campaigns cyber security dismantled dll duck duck hunt enforcement hunt law law enforcement links machines malware persistence phishing phishing campaigns process qakbot qakbot botnet qakbot malware researchers servers survival windows