Research released today by Check Point, revealing that the QBot Trojan operators are using new tactics to hijack legitimate, emailed conversations in order to steal credentials and financial data.
Today it was reported that the QBot Trojan operators are using new tactics to hijack legitimate, emailed conversations in order to steal credentials and financial data. The QBot Trojan’s malware is able to steal browsing data, email records, and even banking credentials. It is also able to install additional malware and ransomware, such as mimikatz, which harvests credentials. Basically, QBot preys on several common end user weaknesses.
One of the ways that companies can help their employees from falling victim to this malware and other cyber threats, is to teach password management and hygiene, as hackers are taking advantage of rampant password reuse. The fact is, the average password is reused 2.7 times, with 99% of users reusing passwords either across work accounts or between work and personal accounts, according to a recent report.
Additionally, it\’s important to engage with your users continuously on appropriate cyber hygiene. With the initial payload delivered via URLs in documents, training is an important factor. It\’s helpful to keep track of your highest risk users as well, via automated, AI-based tools that identify risky behavior that\’s likely to lead to phishing or malware downloads.
Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics