{"id":21800,"date":"2023-04-24T09:00:09","date_gmt":"2023-04-24T17:00:09","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/04\/24\/news-15531\/"},"modified":"2023-04-24T09:00:09","modified_gmt":"2023-04-24T17:00:09","slug":"news-15531","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/04\/24\/news-15531\/","title":{"rendered":"New QakBot C2 servers detected with Sophos NDR"},"content":{"rendered":"<p><strong>Credit to Author: Karl Ackerman| Date: Thu, 20 Apr 2023 13:32:24 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p><span data-contrast=\"none\">As malware continues to evolve and adversaries become more adept at evading detection, dynamic AI and machine learning technologies are critical for detection of the latest threats and attacks.<\/span><\/p>\n<p><span data-contrast=\"none\"><a href=\"https:\/\/www.sophos.com\/ndr\">Sophos NDR<\/a> utilizes a series of machine learning models that are regularly retrained to account for evolving malware families. This approach allows Sophos NDR to identify new malware variants operating covertly deep within the network, even within encrypted traffic, that may be attempting to make calls to previously unidentified command and control servers.\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Recently, Sophos NDR updates detected two new QakBot servers that had not yet been publicly identified. These servers were being used by threat actors to manage and control QakBot infections, a banking trojan that has been active since 2008 and primarily targets financial institutions and their customers.<\/span><\/p>\n<p><span data-contrast=\"none\">The detection of these new QakBot servers highlights the ongoing threat posed by banking trojans and the need for advanced threat detection and response capabilities. Sophos NDR&#8217;s detection of the QakBot servers using encrypted packet analysis technology demonstrates the importance of analyzing encrypted traffic to identify advanced threats.<\/span><\/p>\n<p><span data-contrast=\"none\">Sophos NDR&#8217;s encrypted packet analysis (EPA) technology allows it to detect potential threats without relying on decrypted content. In the table below, you can see the details of the two newly discovered QakBot servers, including the EPA model confidence, detected malware family, flow risks, and TLS information.<\/span><\/p>\n<div>\n<div>\n<div style=\"overflow-x: scroll;\">  <\/div>\n<\/p><\/div>\n<div>\n<div><\/div>\n<div>\n<p>There have been several cybercriminal groups that have been associated with using <span data-contrast=\"none\">QakBot<\/span> in the past. Some of the notable groups include:<\/p>\n<ul>\n<li>Evil Corp: This Russian cybercrime group is known for deploying various banking trojans, including <span data-contrast=\"none\">QakBot<\/span>. They have been linked to several high-profile attacks on financial institutions, with the primary goal of stealing large sums of money.<\/li>\n<li>TA505: This group is believed to be based in Eastern Europe and is known for conducting large-scale phishing campaigns to distribute <span data-contrast=\"none\">QakBot<\/span> and other malware. They are also associated with the Dridex banking trojan and the Locky ransomware.<\/li>\n<li>FIN7: This group is known for targeting hospitality, restaurant, and retail industries using phishing emails and deploying <span data-contrast=\"none\">QakBot<\/span> and other malware to steal payment card data. They have also been linked to the Carbanak and Cobalt Strike malware.<\/li>\n<\/ul><\/div>\n<div>The Sophos NDR EPA model converts packet flows to images and uses a neural network to determine if the image matches what we expect <span data-contrast=\"none\">QakBot<\/span> to look like.\u00a0 For those interested in what that image looks like I have included them here.<br \/> <img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-91180 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/04\/Qakbot.png\" alt=\"\" width=\"745\" height=\"380\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/04\/Qakbot.png 745w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/04\/Qakbot.png?resize=300,153 300w\" sizes=\"auto, (max-width: 745px) 100vw, 745px\" \/><span style=\"font-size: 1em;\">For more information on the Sophos NDR product, please check out the <a href=\"https:\/\/community.sophos.com\/cfs-file\/__key\/communityserver-blogs-components-weblogfiles\/00-00-00-00-96\/sophos_2D00_ndr_2D00_explained_2D00_wp.pdf\">Sophos NDR Explained<\/a> whitepaper.<\/span><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2023\/04\/20\/new-qakbot-c2-servers-detected-with-sophos-ndr\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/04\/Qakbot-1.png\"\/><\/p>\n<p><strong>Credit to Author: Karl Ackerman| Date: Thu, 20 Apr 2023 13:32:24 +0000<\/strong><\/p>\n<p>Sophos NDR updates detected two new QakBot servers that had not yet been publicly identified.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[25038,29167,24562,24552,27604,28404],"class_list":["post-21800","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-mdr","tag-ndr","tag-products-services","tag-security-operations","tag-sophos-mdr","tag-sophos-ndr"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21800"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21800\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21800"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}