{"id":18802,"date":"2022-04-19T10:30:11","date_gmt":"2022-04-19T18:30:11","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/04\/19\/news-12535\/"},"modified":"2022-04-19T10:30:11","modified_gmt":"2022-04-19T18:30:11","slug":"news-12535","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/04\/19\/news-12535\/","title":{"rendered":"Emotet and Qbot in spam mailouts | Kaspersky official blog"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/04\/19135131\/qbot-emotet-spam-mailing-featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andrey Kovtun| Date: Tue, 19 Apr 2022 18:02:11 +0000<\/strong><\/p>\n<p>Our experts have detected significant growth in complex malicious spam e-mails targeting organizations in various countries. The number of these malicious e-mails grew from around 3000 in February 2022 to approximately 30,000 in March. So far, our technologies have detected malicious e-mails written in English, French, Hungarian, Italian, Norwegian, Polish, Russian, Slovenian and Spanish languages.<\/p>\n<h2>How cybercriminals infect victim&#8217;s devices<\/h2>\n<p>Cybercriminals allegedly intercept active e-mail conversations on business matters and send the recipients an e-mail containing either a malicious file or a link in order to infect their devices with a banking trojan. Such scheme makes those messages harder to detect and increases the chances that recipient will fall for the trick.<\/p>\n<p>Some letters that cybercriminals send to the recipients contains a malicious attachment. In other cases, it has a link which leads to a file placed in a legitimate popular cloud-hosting service. Often, malware is contained in an encrypted archive, with the password mentioned in the e-mail body. To convince users to open attachment or download the file via the link, the attackers usually state that it contains some important information, such as a commercial offer.<\/p>\n<p>Our experts have concluded that these e-mails are being distributed as part of a coordinated campaign that aims to spread banking Trojans.<\/p>\n<h2>What kind of malware attackers are using and how dangerous are they?<\/h2>\n<p>In most cases when victims opens a malicious document, it downloads and launches the <a href=\"https:\/\/securelist.com\/qakbot-technical-analysis\/103931\/\" target=\"_blank\" rel=\"noopener\">Qbot<\/a> malware, but our experts has also observed that some of these documents download <a href=\"https:\/\/securelist.com\/emotet-modules-and-recent-attacks\/106290\/\" target=\"_blank\" rel=\"noopener\">Emotet<\/a> instead. Both malware strains are capable of stealing users&#8217; data, collecting data on an infected corporate network, spreading further in the network, and installing ransomware or other Trojans on other network devices. Qbot also can access and steal e-mails.<\/p>\n<h2>How to stay safe<\/h2>\n<p>In order to stay safe from attacks by Qbot and Emotet (or any other malware spreading via e-mail), we recommend the following:<\/p>\n<ul>\n<li>Installing a reliable <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-security-appliance?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____\" target=\"_blank\">security solution on a mail gateway level<\/a> \u2014 it will automatically filter out spam and malicious messages before end-users even have a chance to make a mistake.<\/li>\n<li>Providing your staff with basic <a href=\"https:\/\/k-asap.com\/en\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\">cybersecurity hygiene training<\/a> \u2014 it can teach them to spot cybercriminal behavior (for example to know that password in the same e-mail with the encrypted archive can serve only one purpose \u2014 to deceive antimalware technologies).<\/li>\n<li>Conducting simulated attacks to ensure that your employees know how to distinguish phishing and malicious e-mails and genuine ones.<\/li>\n<li>Using a <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\">security solution<\/a> on every endpoint that is connected to the Internet. In this case if your staff fall victim to an attack, it can prevent a file from opening or a malicious link from working.<\/li>\n<\/ul>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/qbot-emotet-spam-mailing\/44144\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/04\/19135131\/qbot-emotet-spam-mailing-featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andrey Kovtun| Date: Tue, 19 Apr 2022 18:02:11 +0000<\/strong><\/p>\n<p>Kaspersky has unveiled a significant spike in activity from a malicious spam e-mail campaign, which spreads Emotet and Qbot malware and targets corporate users.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[1001,11789,12177,3764,10518,10438],"class_list":["post-18802","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-business","tag-e-mail","tag-enterprise","tag-malware","tag-spam","tag-threats"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18802","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18802"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18802\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18802"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}