Researchers at Cofense have recently uncovered a sophisticated phishing campaign that emerged in September. This campaign, believed to be linked to the QakBot operation, utilizes advanced tactics and evasive techniques to distribute malware and gain unauthorized access.
The phishing campaign begins by distributing DarkGate malware, which is later replaced by PikaBot. These loaders have the ability to perform various malicious activities, including cryptocurrency mining  , credential theft , ransomware attacks, and remote access . DarkGate employs legitimate AutoIT files and multiple scripts , while PikaBot is a newly developed loader equipped with evasive techniques to avoid detection.
The campaign employs tactics similar to previous QakBot phishing campaigns , such as hijacked email threads and unique URL patterns  . It also utilizes an infection chain that resembles QakBot delivery. By exploiting the Microsoft ProxyLogon vulnerability , the threat actors impersonate administrators in hijacked email threads, gaining trust from their targets.
The most common delivery mechanism in this campaign is JS Droppers , which Cofense Intelligence has diligently tracked and documented . Phishing campaigns utilizing DarkGate and PikaBot have been observed, suggesting a connection to the same threat actors behind the QakBot operation. These malware families are attractive to cybercriminals due to their ability to deliver additional payloads to compromised hosts.
The discovery of this highly advanced and evasive phishing campaign has significant implications for cybersecurity. Organizations must remain vigilant and implement robust security measures to mitigate the risk of falling victim to such attacks. Additionally, the connection to the QakBot operation highlights the need for ongoing research and collaboration to stay ahead of evolving cyber threats. By understanding the tactics and techniques employed by threat actors, we can better protect ourselves and our systems from future attacks.