A new malicious QBot campaign was recently discovered spreading on Windows
devices through PDF and Windows Script Files. The former banking Trojan is
notorious for facilitating initial access to compromised networks for threat
actors.

Perpetrators are historically known to use QBot to deploy additional malware,
such as Cobalt Strike beacons
[https://www.bitdefender.com/blog/hotforsecurity/emotet-deploys-cobalt-strike-beacons-directly-onto-targets-with-new-technique/]
and backdoors, to move lat

Oh hi there 👋
It’s nice to meet you.

Sign up to receive awesome content in your inbox, every month.

We don’t spam! Read our privacy policy for more info.

Oh hi there 👋
It’s nice to meet you.

Sign up to receive awesome content in your inbox, every month.

We don’t spam! Read our privacy policy for more info.

By rooter