July 13, 2022, 4:36 p.m. | SC Staff

SC Magazine feed for Strategy www.scmagazine.com

The Hacker News reports that HYPERLINK "https://www.scmagazine.com/brief/email-security/novel-windows-installer-vector-leveraged-by-qbot-malware" Qakbot malware operators have been discovered by Zscaler researchers to have adopted code obfuscation and new attack chain layers, as well as leveraged various URLs and file extensions for payload delivery in an effort to better conceal their operations. "Most recently, threat actors have transformed their techniques to evade detection by using ZIP file extensions, enticing file names with common formats, and Excel (XLM) 4.0 to trick victims into downloading malicious attachments that …

bypass detection malware qakbot threat intelligence

Red Team Penetration Tester and Operator, Junior

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)

Director, Security Operations & Risk Management

@ Live Nation Entertainment | Toronto, ON

IT and Security Specialist APAC (F/M/D)

@ Flowdesk | Singapore, Singapore, Singapore

Senior Security Controls Assessor

@ Capgemini | Washington, DC, District of Columbia, United States; McLean, Virginia, United States

GRC Systems Solution Architect

@ Deloitte | Midrand, South Africa

Cybersecurity Subject Matter Expert (SME)

@ SMS Data Products Group, Inc. | Fort Belvoir, VA, United States