Jan. 12, 2023, 5:20 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news


Executive Summary


This paper investigates a recent QakBot phishing campaign's ability to evade Mark-of-the-Web (MoTW) security features, allowing for escape from the designated security zone and  successful installation of malicious software on victim device.. Key observations:




  • EclecticIQ analysts investigated QakBot phishing campaigns switching to a Zero-Day Vulnerability to evade Windows Mark of the Web (MoTW). QakBot may be able to increase its infection success rate as a result of the switch to a zero-day exploit.




  • The threat actor distributes QakBot …

analysts bypass campaign campaigns device eclecticiq escape evade executive features infection installation key malicious malicious software malware mark mark of the web may motw phishing phishing campaign qakbot rate result security security features software the web unpatched victim vulnerability web windows zero-day zero-day vulnerability

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Solution Architect

@ Civica | London, England, United Kingdom

Information Security Officer (80-100%)

@ SIX Group | Zurich, CH

Cloud Information Systems Security Engineer

@ Analytic Solutions Group | Chantilly, Virginia, United States

SRE Engineer & Security Software Administrator

@ Talan | Mexico City, Spain