Alias Description | Votes |
---|---|
QakBot is a possible alias for Qbot. Qakbot is a potent piece of malware, or malicious software, that infiltrates computer systems through suspicious downloads, emails, or websites. Once installed, it can steal personal information, disrupt operations, or even hold data hostage for ransom. This malware, built by various groups includin | 15 |
Pinkslipbot is a possible alias for Qbot. Pinkslipbot, also known as Qakbot, QBot or QuackBot, is a modular information-stealing malware that has been active since 2008. Initially emerging in 2007 as a banking trojan, it targeted financial institutions to steal sensitive data. Over the years, however, its functionality evolved and diversifi | 11 |
Emotet is a possible alias for Qbot. Emotet is a particularly dangerous and insidious type of malware that has reemerged as a significant threat. This malicious software, which infects systems through suspicious downloads, emails, or websites, can steal personal information, disrupt operations, or even hold data for ransom. Emotet-infe | 8 |
REvil is a possible alias for Qbot. REvil is a notorious malware, specifically a type of ransomware, that gained prominence in the cybercrime world as part of the Ransomware as a Service (RaaS) model. This model became increasingly popular in 2020, establishing relationships between first-stage malwares and subsequent ransomware attac | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Black Basta Malware is associated with Qbot. Black Basta is a notorious malware and ransomware group known for its high-profile attacks on various sectors. The group, also known as Storm-0506, has been active since at least early 2022 and has accumulated over $107 million in Bitcoin ransom payments. It deploys malicious software to exploit vul | Unspecified | 6 |
The IcedID Malware is associated with Qbot. IcedID is a prominent malware that has been utilized in various cyber-attacks. It functions as a malicious software designed to infiltrate and damage computer systems, often through suspicious downloads, emails, or websites. Once inside a system, IcedID can steal personal information, disrupt operat | Unspecified | 4 |
The malware Qakbot (Qbot is associated with Qbot. | Unspecified | 4 |
The Latrodectus Malware is associated with Qbot. Latrodectus is a malicious software (malware) first discovered in late 2023, which has been gaining momentum among threat actors. Named after a string of code found during analysis, the malware is not a variant of IcedID but shares similar characteristics. This led researchers to conclude that both | Unspecified | 4 |
The Anubis Malware is associated with Qbot. Anubis, also known as IcedID or Bokbot, is a sophisticated piece of malware primarily functioning as a banking trojan. It was first discovered by X-Force in September 2017 and has since evolved to target a wide range of financial applications. Notably, Anubis has consistently ranked among the top fi | Unspecified | 3 |
The Conti Malware is associated with Qbot. Conti is a notorious type of malware, specifically ransomware, that infiltrates computer systems to steal data and disrupt operations. The malicious software often spreads through suspicious downloads, emails, or websites, and once inside, it can hold data hostage for ransom. The Conti ransomware op | Unspecified | 3 |
The Egregor Malware is associated with Qbot. Egregor is a malicious software variant of the Sekhmet ransomware that operates on a Ransomware-as-a-Service (RaaS) model. It is speculated to be associated with former Maze affiliates, and is notorious for its double extortion tactics, which involve not only encrypting the victim's data but also pu | Unspecified | 3 |
The Formbook Malware is associated with Qbot. Formbook is a type of malware, malicious software designed to exploit and damage computer systems. It infects systems through suspicious downloads, emails, or websites and can steal personal information, disrupt operations, or hold data hostage for ransom. Formbook has been linked with other forms o | Unspecified | 3 |
The Pikabot Malware is associated with Qbot. Pikabot is a type of malware that serves as a trojan, providing initial access to infected computers. This enables the execution of ransomware deployments, remote takeovers, and data theft. It is part of a wider array of malicious software, including IcedID, Qakbot, Gozi, DarkGate, AsyncRAT, JinxLoa | Unspecified | 3 |
The MegaCortex Malware is associated with Qbot. MegaCortex is a type of malware known for its harmful effects on computer systems and devices. It was identified by Dragos, a cybersecurity firm, as having a relationship with another ransomware called EKANS. Both MegaCortex and EKANS have specific characteristics that pose unique risks to industria | Unspecified | 2 |
The ProLock Malware is associated with Qbot. ProLock is a type of malware, specifically ransomware, that is designed to infiltrate computer systems, often unbeknownst to the user. It typically enters systems through suspicious downloads, emails, or websites. Once inside, ProLock can steal personal information, disrupt operations, and hold data | Unspecified | 2 |
The Raspberry Robin Malware is associated with Qbot. Raspberry Robin is a sophisticated piece of malware that uses a variety of tactics to infiltrate and exploit computer systems. It employs the CPUID instruction to conduct several checks, enabling it to assess the system's characteristics and vulnerabilities. Furthermore, Raspberry Robin has been obs | Unspecified | 2 |
The Brute Ratel Malware is associated with Qbot. Brute Ratel is a malicious software (malware) that has been increasingly used by cyber threat actors to exploit and damage computer systems. It is often delivered through suspicious downloads, emails, or websites and can infiltrate systems without the user's knowledge. Once inside, Brute Ratel can s | Unspecified | 2 |
The Doppelpaymer Malware is associated with Qbot. DoppelPaymer is a type of malware, specifically ransomware, that was initially developed and operated by the GOLD DRAKE threat group under the name BitPaymer. The software was later reworked and renamed to DoppelPaymer by another threat group, GOLD HERON. This malicious software first appeared in mi | Unspecified | 2 |
The Fakeupdates Malware is associated with Qbot. FakeUpdates, a malicious software (malware), has become increasingly prevalent in recent years. It infiltrates systems through suspicious downloads, emails, or websites, often unbeknownst to the user, and can disrupt operations, steal personal information, or hold data hostage for ransom. In 2022, a | Unspecified | 2 |
The Darkgate Malware is associated with Qbot. DarkGate is a multifunctional malware that poses significant threats to computer systems and networks. It has been associated with various malicious activities such as information theft, credential stealing, cryptocurrency theft, and ransomware delivery. DarkGate infiltrates systems through suspicio | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The TA577 Threat Actor is associated with Qbot. TA577 is a threat actor, or malicious entity, known for its extensive use of QBot, a banking Trojan. In November 2023, Proofpoint's Threat Research Team identified TA577 as an initial access broker that began using Latrodectus, a new malware, in three separate intrusion campaigns. The group typicall | Unspecified | 5 |
Alias Description | Association Type | Votes |
---|---|---|
The vulnerability CVE-2022-41073 is associated with Qbot. | Unspecified | 2 |
The Follina Vulnerability is associated with Qbot. Follina (CVE-2022-30190) is a software vulnerability that was discovered and exploited in the first half of 2022. It was weaponized by TA413, a malicious entity known for its cyber attacks, shortly after its discovery and publication. The vulnerability was used to target the Sophos Firewall product, | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
Checkpoint | a month ago | ||
Checkpoint | 4 months ago | ||
RIA - Information System Authority | 5 months ago | ||
Pulsedive | 5 months ago | ||
BankInfoSecurity | 5 months ago | ||
Securityaffairs | 5 months ago | ||
BankInfoSecurity | 5 months ago | ||
BankInfoSecurity | 5 months ago | ||
Krebs on Security | 5 months ago | ||
Securityaffairs | 6 months ago | ||
InfoSecurity-magazine | 6 months ago | ||
BankInfoSecurity | 7 months ago | ||
DARKReading | 7 months ago | ||
CERT-EU | 7 months ago | ||
CERT-EU | 7 months ago | ||
CERT-EU | 7 months ago | ||
CERT-EU | 8 months ago | ||
CERT-EU | 8 months ago | ||
Malwarebytes | 8 months ago | ||
BankInfoSecurity | 8 months ago |