A follow-up to a previous SANS Institute diary entry on the actor using Rig exploit kit (EK) to deliver Qbot. The author infected more Windows hosts from other compromised websites in order to obtain additional data about the actor. This actor has been delivering Qbot (also known as Qakbot) malware. The actor uses a gate to route traffic from the compromised website to the EK landing page. In this case, the gate returns a variable that is translated to a URL for the EK landing page. The sequence of events is: 1) User visits a website compromised by this actor; 2) An HTTP GET request for a .js file from the compromised site returns text with malicious script appended to it; 3) An HTTP GET request to the gate returns a variable used by the malicious script; and 4) The variable sent by the gate is decrypted, and an HTTP GET request for the EK landing page is sent.
Created: 2026-02-23
Indicatorsは見つかっていない。
このPulseに見つかったCVEはありません。