New Case Study: Credit Union Boosts Secops With Continuous Testing
Learn More
New Research: Broken Attestation in Windows Admin Center
Learn More
Whitepaper: An Inside Look at the Technology Behind Cymulate
Learn More
New Integration Partnership with WIZ!
Learn More

QBot using new attack vector in its latest phishing emails

April 20, 2023

Presently, QBot is being disseminated via reply-chain phishing emails, whereby threat actors employ stolen email exchanges and subsequently respond to them with links to malware or malicious attachments. The adoption of reply-chain emails is an effort to minimize the suspicion prompted by a phishing email since it appears to be a reply to an ongoing conversation. These phishing emails are composed in multiple languages, indicating that this is a malware distribution campaign with a global reach. The phishing emails contain a PDF attachment with the name 'CancelationLetter-[number].pdf,' which prompts the recipient to click on the "open" button to display protected files when the document is opened. But instead of displaying files, a ZIP file containing a Windows Script (wsf) file is downloaded when the button is clicked. A file with a .wsf extension is a Windows Script File that executes a combination of VBScript and JScript code when double-clicked. In the QBot malware distribution campaign, a heavily obfuscated WSF file is used to execute a PowerShell script on the targeted device.