• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security, News

The Qakbot Malware Now Interjects Itself Into The Middle of Email Conversations

Qakbot uses other compromised accounts to interject itself in the form of a reply-all email that includes a link to download malicious files.

March 11, 2022 Zachary Comeau Leave a Comment

Atera ESET Integration
stock.adobe.com

The notorious and heavily distributed email-borne malware Qakbot is now being spread via a new technique: inserting malicious replies into the middle of existing email conversations.

According to cybersecurity firm Sophos, Qakbot uses the compromised accounts of other infected victims to interject itself in the form of a reply-all message that includes a short sentence and a link to download a zip file that contains a malicious office document.

In a new report outlining this threat, Sophos says the malware has become adept at this trickery, which includes quoting the original message after its malicious reply. That makes it challenging for targets of these attacks to recognize that the message didn’t come from the actual user.

Due to recent action by law enforcement and tech companies, including leaks of internal cybercriminal data, other email-driven botnets like Emotet and Trickbot have seen setbacks, leading to a “resurgence’ of Qakbot.

These messages usually contain brief a short sentence followed by a link to download a zip archive, which may be bare URLs or hotlinked text in the message body.

Some examples of messages given by Sophos include:

Hello,

Sorry for my late reply to your question. Attached is the document you need.

DOCUMENT DOWNLOAD LINK.

And:

Good morning,

Please read this ASAP.

DOCUMENT DOWNLOAD LINK.

In other cases, the messages are sent in the assumed language of the recipient.

In these incidents, the Qakbot malware delivered at least three different payloads including a web injector for stealing account credentials and an ARP-scanning component that attempted o profile the network on which it was running. It can also continue to communicate with its command-and-control server and receive payload updates months after infection.

According to Sophos, the malware and the command-and-control messaging is elaborately obfuscated and encrypted, concealing sensitive strings, configuration data and C2 addresses.

As with any email-based threat that relies on user action, education and awareness is the key to prevent Qakbot infection. Users should treat email with a “reflexive distrust,” according to the company.

Samples related to this malware may be detected as Mal/EncPk-AQC and some payloads (notably, the webinjects code) will be detected as Mal/QbotDat-A, according to Sophos.

For more information on this threat, read Sophos’ report.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cybersecurity, Malware

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.