New Malware Mayhem: QakBot’s BackConnect Strikes Again!

Cybersecurity researchers have unveiled a new BackConnect malware linked to the notorious QakBot loader. This malware acts as a standalone backdoor, giving threat actors hands-on keyboard access and the ability to gather system information. It’s like a cybercrime Swiss Army knife—if Swiss Army knives were, you know, illegal.

Pro Dashboard

Hot Take:

Just when you thought it was safe to log onto your computer, the digital equivalent of a boogeyman under the bed, BackConnect, comes creeping back into the cybersecurity spotlight. Now with a fancy DNS tunnel, it’s like the QakBot gang decided their malware needed a career upgrade. Clearly, these cybercriminals missed the memo that “going old school” is only cool when it involves vinyl records and Polaroid cameras, not malware!

Key Points:

  • A new BackConnect (BC) malware linked to the QakBot loader has been discovered.
  • The BC module is used for persistence by threat actors and has been found on infrastructure distributing ZLoader.
  • QakBot suffered a setback in 2023, but sporadic campaigns continue to emerge.
  • BackConnect allows remote access and uses the host as a proxy with an embedded VNC component.
  • The BC malware is linked to threat clusters STAC5777 and STAC5143 by Sophos.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?