April 8, 2024, 9:04 a.m. | Guru Baran

Cyber Security News cybersecuritynews.com

Law enforcement dismantled the Qakbot botnet’s servers in 2023’s Operation Duck Hunt, but researchers identified its reemergence with a modified DLL, which utilizes the srtasks.exe process for persistence, ensuring its survival on restarted machines.  Qakbot continues to spread via phishing campaigns with various lures, including attachments or links that deliver the malware upon user interaction.  […]


The post Meet The New Qakbot DLL That Abuses Windows Process For persistence appeared first on Cyber Security News.

attachments botnet campaigns cyber security dismantled dll duck duck hunt enforcement hunt law law enforcement links machines malware persistence phishing phishing campaigns process qakbot qakbot botnet qakbot malware researchers servers survival windows

EY- GDS- Cybersecurity- Staff

@ EY | Miguel Hidalgo, MX, 11520

Staff Security Operations Engineer

@ Workiva | Ames

Public Relations Senior Account Executive (B2B Tech/Cybersecurity/Enterprise)

@ Highwire Public Relations | Los Angeles, CA

Airbus Canada - Responsable Cyber sécurité produit / Product Cyber Security Responsible

@ Airbus | Mirabel

Investigations (OSINT) Manager

@ Logically | India

Security Engineer I, Offensive Security Penetration Testing

@ Amazon.com | US, NY, Virtual Location - New York