New Malware Mayhem: QakBot’s BackConnect Strikes Again!
Cybersecurity researchers have unveiled a new BackConnect malware linked to the notorious QakBot loader. This malware acts as a standalone backdoor, giving threat actors hands-on keyboard access and the ability to gather system information. It’s like a cybercrime Swiss Army knife—if Swiss Army knives were, you know, illegal.

Hot Take:
Just when you thought it was safe to log onto your computer, the digital equivalent of a boogeyman under the bed, BackConnect, comes creeping back into the cybersecurity spotlight. Now with a fancy DNS tunnel, it’s like the QakBot gang decided their malware needed a career upgrade. Clearly, these cybercriminals missed the memo that “going old school” is only cool when it involves vinyl records and Polaroid cameras, not malware!
Key Points:
- A new BackConnect (BC) malware linked to the QakBot loader has been discovered.
- The BC module is used for persistence by threat actors and has been found on infrastructure distributing ZLoader.
- QakBot suffered a setback in 2023, but sporadic campaigns continue to emerge.
- BackConnect allows remote access and uses the host as a proxy with an embedded VNC component.
- The BC malware is linked to threat clusters STAC5777 and STAC5143 by Sophos.