Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Gartner® Report: Strategic Roadmap for CTEM
Learn More
New Integration Partnership with WIZ!
Learn More
Threat Exposure Validation Impact Report 2025
Learn More

QBot using new attack vector in its latest phishing emails

April 20, 2023

Presently, QBot is being disseminated via reply-chain phishing emails, whereby threat actors employ stolen email exchanges and subsequently respond to them with links to malware or malicious attachments. The adoption of reply-chain emails is an effort to minimize the suspicion prompted by a phishing email since it appears to be a reply to an ongoing conversation. These phishing emails are composed in multiple languages, indicating that this is a malware distribution campaign with a global reach. The phishing emails contain a PDF attachment with the name 'CancelationLetter-[number].pdf,' which prompts the recipient to click on the "open" button to display protected files when the document is opened. But instead of displaying files, a ZIP file containing a Windows Script (wsf) file is downloaded when the button is clicked. A file with a .wsf extension is a Windows Script File that executes a combination of VBScript and JScript code when double-clicked. In the QBot malware distribution campaign, a heavily obfuscated WSF file is used to execute a PowerShell script on the targeted device.