{"id":24077,"date":"2024-03-01T13:10:08","date_gmt":"2024-03-01T21:10:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/03\/01\/news-17807\/"},"modified":"2024-03-01T13:10:08","modified_gmt":"2024-03-01T21:10:08","slug":"news-17807","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/03\/01\/news-17807\/","title":{"rendered":"PikaBot malware on the rise: What organizations need to know\u00a0"},"content":{"rendered":"\n<p>A new type of malware is being used by ransomware gangs in their attacks, and its name is PikaBot.<\/p>\n<p>A relatively new trojan that emerged in early 2023, PikaBot is the apparent successor to the <strong>infamous QakBot (QBot) trojan<\/strong> that was shut down in <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/08\/major-takedown-of-qakbot-infrastructure\">August 2023<\/a>. QBot was used by many ransomware gangs in the past for its versatile ability to facilitate initial access and deliver secondary payloads.<\/p>\n<p>After QBot got shut down, there was a vacuum in the ransomware gang tool box\u2014but <strong>with PikaBot, that\u2019s beginning to change<\/strong>: <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2024\/02\/ransomware-review-february-2024\">last month we wrote about the first recorded instance<\/a> of PikaBot being used by ransomware gangs, specifically Black Basta, in their attacks.<\/p>\n<p>Let\u2019s dig into how PikaBot works, how it\u2019s distributed, how ransomware gangs use it in their attacks, and how to stop it with ThreatDown.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-a-closer-look-at-pikabot\">A closer look at PikaBot<\/h2>\n<p>To get a better idea of how PikaBot works, we need to first understand what a modular trojan is.<\/p>\n<p>Simply put, <strong>a modular trojan<\/strong> is a type of malware designed to be flexible and extensible, allowing attackers to add or update its functionalities easily without needing to replace the whole malware.<\/p>\n<p>The modular nature of trojans like QBot and PikaBot are what makes them so dangerous. Unlike simpler malware, <strong>PikaBot can execute arbitrary commands, download additional payloads, and inject malicious shellcode into legitimate processes <\/strong>running on a victim&#8217;s computer. Think of it like a backdoor that allows attackers to set up for the next stages of their attacks.<\/p>\n<p>Once it&#8217;s installed onto a system, PikaBot has a whole host of ways to stay under the radar, evading detection by most conventional security tools through techniques like indirect system calls and advanced obfuscation methods.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-how-pikabot-is-distributed\">How Pikabot is distributed<\/h2>\n<p>The distribution of PikaBot, like many other malicious loaders such as QBot and DarkGate,<strong> is heavily reliant on email spam campaigns<\/strong>. Even so, ThreatDown Intelligence researchers <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/12\/pikabot-distributed-via-malicious-ads\">have seen PikaBot being delivered via malicious search ads as well<\/a> (also known as \u201c<strong>malvertising<\/strong>\u201d).<\/p>\n<p>PikaBot\u2019s initial access campaigns are meticulously crafted, utilizing geolocalized spam emails that target specific countries. The emails often contain links to external <a href=\"https:\/\/www.malwarebytes.com\/glossary\/server-message-block-smb\">SMB (Server Message Block) shares<\/a>, which host malicious zip files.<\/p>\n<p>SMB shares are network folders leveraging the SMB protocol\u2014a network file sharing protocol designed for sharing files and printers across devices on a network. Attackers often use SMB shares to distribute malware. In this case, <strong>downloading and opening the hosted zip file results in PikaBot infection.<\/strong><\/p>\n<p>For example, consider the below phishing email containing a link to a zip file containing the PikaBot payload.<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1934\" height=\"1022\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/Screenshot-2024-03-01-at-2.44.52\u202fPM.png?w=1024\" alt=\"\" class=\"wp-image-105781\" \/><\/figure>\n<p class=\"has-text-align-center\">Source: <a href=\"https:\/\/app.any.run\/tasks\/478732bb-b180-4d14-9a93-5e424c44a97e?utm_source=twitter&amp;utm_medium=post&amp;utm_campaign=pikabot&amp;utm_content=linktoservice&amp;utm_term=210224\/\">ANY.RUN<\/a> (Translation: I sent you some paperwork the other day. Did you get it?)<\/p>\n<p>Once the recipient interacts with these emails by clicking on the link, they are taken to the SMB share hosting the malicious zip files.<\/p>\n<p>Extracting a zip and double-clicking on the executable within it will install PikaBot.<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1934\" height=\"1022\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/Screenshot-2024-03-01-at-2.50.29\u202fPM.png?w=1024\" alt=\"\" class=\"wp-image-105784\" \/><\/figure>\n<p class=\"has-text-align-center\">Source: <a href=\"https:\/\/app.any.run\/tasks\/478732bb-b180-4d14-9a93-5e424c44a97e?utm_source=twitter&amp;utm_medium=post&amp;utm_campaign=pikabot&amp;utm_content=linktoservice&amp;utm_term=210224\/\">ANY.RUN<\/a><\/p>\n<h2 class=\"wp-block-heading\" id=\"h-how-ransomware-gangs-use-pikabot\">How ransomware gangs use PikaBot<\/h2>\n<p>Ransomware gangs commonly use modular trojans like PikaBot for their attacks.<\/p>\n<p>Before it was shut down, for example, Qbot allowed ransomware gangs to <strong>seamlessly integrate various attack techniques into their operations<\/strong>, including stealing credentials, moving laterally across networks, and ultimately deploying ransomware or other malicious payloads.<\/p>\n<p>PikaBot is being used by ransomware attackers in a similar way.<\/p>\n<p>Once PikaBot has established a foothold in a network, it allows attackers to engage in <strong>a wide range of follow-up activities<\/strong>.<\/p>\n<p>For example, researchers have noted affiliates of the <a href=\"https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/pikabot-malware-qakbot-replacement-black-basta-attacks\">BlackBasta ransomware gang using <\/a>PikaBot to use <strong>encrypted communications with command and control (C&amp;C) servers<\/strong>. Pikabot can also assist gangs in getting detailed information about infected systems, <strong>helping them tailor their ransomware for maximum impact.<\/strong><\/p>\n<h2 class=\"wp-block-heading\" id=\"h-how-to-stop-pikabot-with-threatdown\">How to stop PikaBot with ThreatDown<\/h2>\n<p>Besides preventing initial access through things such as a web content filter and phishing training, choosing an<a href=\"https:\/\/www.threatdown.com\/products\/endpoint-detection-and-response\/\"> Endpoint Detection and Response (EDR<\/a>) platform that<strong> automatically detects and quarantines threats<\/strong> like PikaBot is crucial.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"447\" height=\"322\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image1.png\" alt=\"\" class=\"wp-image-105786\" \/><\/figure>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"354\" height=\"251\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/image3.png\" alt=\"\" class=\"wp-image-105785\" \/><\/figure>\n<p>However, given the constant evolution of malware, identifying dynamic threats like Pikabot boils down to two words:<strong> threat hunting<\/strong>.<\/p>\n<p>At ThreatDown, we talk a lot about the importance of threat hunting for SMBs\u2014and not for no good reason, either. Just consider the fact that, when an attacker breaches a network, they don\u2019t attack right away. <strong>The median amount of time between system compromise and detection <a href=\"https:\/\/www.google.com\/search?q=21+days+mandiant+dwell+time&amp;rlz=1C5GCEM_enUS1001US1003&amp;oq=21+days+mandiant+dwell+time&amp;gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIHCAEQIRifBdIBCDQ2MjNqMGo0qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8#:~:text=Mandiant%20Unveils%20M,company%20%E2%80%BA%20press%2Dreleases\">is 21 days<\/a><\/strong><a href=\"https:\/\/www.google.com\/search?q=21+days+mandiant+dwell+time&amp;rlz=1C5GCEM_enUS1001US1003&amp;oq=21+days+mandiant+dwell+time&amp;gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIHCAEQIRifBdIBCDQ2MjNqMGo0qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8#:~:text=Mandiant%20Unveils%20M,company%20%E2%80%BA%20press%2Dreleases\">.<\/a><\/p>\n<p>By that time, it\u2019s often too late. Data has been harvested or ransomware has been deployed.<\/p>\n<p>Threat hunting helps find and remediate highly-obfuscated threats like PikaBot that can quietly lurk in the network, siphoning off confidential data and searching for credentials to access the \u201ckeys to the kingdom.\u201d<\/p>\n<p>For example, <a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/05\/tracking-down-a-trojan-an-inside-look-at-threat-hunting-in-a-corporate-network\">as detailed in one case study<\/a>, the ThreatDown Managed Detection and Response (MDR) team employed threat hunting techniques to uncover and neutralize a sophisticated QBot attack on a reputable oil and gas company. The team&#8217;s approach involved <strong>meticulously examining Indicators of Compromise (IoCs), analyzing network traffic, and scrutinizing unusual patterns of behavior <\/strong>within the company&#8217;s IT infrastructure, ultimately resulting in Qbot\u2019s discovery on the network and isolation of infected systems.<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1400\" height=\"859\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/02\/image3.png?w=1024\" alt=\"\" class=\"wp-image-105622\" \/><\/figure>\n<p class=\"has-text-align-center\">ThreatDown MDR workflow<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-stop-threats-like-pikabot-today\">Stop threats like PikaBot today<\/h2>\n<p>Want to learn more about how ThreatDown stops new threats like PikaBot? <a href=\"https:\/\/www.threatdown.com\/contact-us\/\">Fill out this form to speak with an expert and get a custom quote.<\/a><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2024\/03\/pikabot-malware-on-the-rise-what-organizations-need-to-know\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Ransomware gangs are using a powerful new trojan named PikaBot. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001,12040],"class_list":["post-24077","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business","tag-threat-intelligence"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24077"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24077\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24077"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24077"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}