Qbot malware found smuggled inside Windows Installer packages

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • PCHF IT Feeds
    PCHF Bot
    • Jan 2015
    • 54578

    #1

    Qbot malware found smuggled inside Windows Installer packages

    Qbot botnet operators are no longer distributing the malware via weaponized Microsoft Office documents. Instead, they’re opting for malicious MSI Windows Installer packages.

    Cybersecurity researchers see this as a “direct reaction” to Microsoft’s move to prevent malware being delivered via Office macros.

    Qbot, or Quakbot, is a Windows banking trojan that’s been roaming in the wild for more than a decade. Threat actors usually use it to steal banking login information, as well as personal and other identity-related data. It can also be used as a dropper that distributes Cobalt Strike on compromised endpoints.

    [HEADING=1]Macros disabled since January[/HEADING]

    Among the threat actors usually deploying Qbot are REvil, Egregor, and MegaCortex, all of which usually target companies, rather than individuals.

    In late January this year, Microsoft made a major move, in a bid to discourage criminals from using Office files to distribute malware - it disabled Excel 4.0 (XLM) macros by default.

    Back in July 2021, the company released a new Excel Trust Center setting option, allowing administrators to restrict the usage of Excel 4.0 (XLM) macros. It has since made this option default for everyone.

    Excel 4.0 (XLM) macros were the default format until 1993, and even though they’ve since been discontinued, they can still be run by the latest versions of the Office program. That makes them ideal for threat actors, who’ve been abusing them to push malware such as TrickBot, Zloader, Qbot, Dridex, ransomware, and many other malicious programs.

    Read more
    Fujifilm taken down by serious ransomware attack

    This notorious malware has returned after months away

    Microsoft Excel is making a big change to protect against malware
    Administrators can use existing Microsoft 365 applications policy control to configure this setting. The Group Policy setting “Macro Notification Settings” for Excel can be found in the following path and registry key:

    Group Policy Path: User configuration > Administrative templates > Microsoft Excel 2016 > Excel Options > Security > Trust Center.

    Registry Key Path: Computer\HKEY_CURRENT_USER\SOFTWARE\Policies\Micro soft\Office\16.0\excel\security

    [ul]
    [li]If you’re worried about catching malware, you might want to consider one of the best antivirus solutions right now[/li][/ul]

    Via: BleepingComputer

    Continue reading…
Working...