QakBot Malware Resurfaces with New Tactics, Targeting the Hospitality Industry

silversurfer

Super Moderator
Thread author
Verified
Top Poster
Staff Member
Malware Hunter
Forum Veteran
Aug 17, 2014
12,726
123,827
8,399
A new wave of phishing messages distributing the QakBot malware has been observed, more than three months after a law enforcement effort saw its infrastructure dismantled by infiltrating its command-and-control (C2) network.

Microsoft, which made the discovery, described it as a low-volume campaign that began on December 11, 2023, and targeted the hospitality industry.

"Targets received a PDF from a user masquerading as an IRS employee," the tech giant said in a series of posts shared on X (formerly Twitter).
"The PDF contained a URL that downloads a digitally signed Windows Installer (.msi). Executing the MSI led to Qakbot being invoked using export 'hvsi' execution of an embedded DLL."
 
Certainly have been a bunch of malicious files with valid certificates lately...
Q4d8f.png
 
Recently I have seen many cracks with digital certificate matching with original software. How do they obtain such certificates?
Could you send me an example?
As any difference between a binary should require a resign
So It seems impossible unless they steal a certificate