Malware’s Summer Vacation: QakBot’s Mischievous Escapades

The QakBot malware takes a summer break, only to return with 15 new command-and-control servers. The malware’s C2 network architecture resembles that of Emotet and IcedID, with most servers stationed in India and the US. QakBot compromises victims’ systems twice, making them part of the C2 infrastructure.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here