Skip to content
  Sunday 10 December 2023
Trending
October 19, 2023Senior Cybersecurity Project Manager October 9, 2023Concerns for IoT Security Raised by High-Severity Flaws in ConnectedIO’s 3G/4G Routers October 5, 2023NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations June 16, 2023Cybersecurity Best Practices for Remote Work September 3, 2023Microsoft Ranked as the Most-Impersonated Brand in Phishing Exploits September 2, 2023Understanding the Disturbing Breach Trends in Healthcare May 30, 2023CISA Releases One Industrial Control Systems Advisory November 29, 2023Amazon Titan Introduces Text and Image Generative AI Embeddings March 23, 2023CP Plus KVMS Pro | CISA September 22, 2023Navigating the Transformation: Embarking on a Journey to the Cloud
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  New Phishing Attacks Employ QakBot’s Tactics: DarkGate and PikaBot Malware Revive Old Techniques
Industry News

New Phishing Attacks Employ QakBot’s Tactics: DarkGate and PikaBot Malware Revive Old Techniques

SecuredyouadmSecuredyouadm—November 20, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Apache ActiveMQ Vulnerability Exploited by HelloKitty Ransomware Group

November 2, 2023

Zero Trust Implementation Proves Challenging for Federal Agencies, According to NIST

November 30, 2023

Webinar: Gaining Insight into Privacy Concerns with Generative AI

September 2, 2023

Is it Possible for Governments to Manage AI Effectively?

October 6, 2023



Phishing campaigns delivering malware, such as DarkGate and PikaBot, are using tactics similar to those previously seen in attacks involving the QakBot trojan. These tactics include hijacked email threads as the initial infection, URLs with unique patterns, and an infection chain similar to QakBot delivery. DarkGate and PikaBot are attractive options for cybercriminals because they can deliver additional payloads to compromised hosts. DarkGate uses advanced techniques to evade antivirus systems and can log keystrokes, execute PowerShell, and implement a reverse shell for remote control. The phishing campaign targets a wide range of sectors and uses booby-trapped URLs in hijacked email threads to propagate the attack. The attacks can lead to the delivery of various malicious files, such as crypto mining software, reconnaissance tools, or ransomware.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Number of Organizations Affected by MOVEit Attack Surpasses 2,618
Critical and Unpatched Bugs Found in Popular AI Tools
Related posts
  • Related posts
  • More from author
Industry News

Unattractive Trends in Health Data Breach: A Look into 2023

December 9, 20230
Industry News

Europe Achieves a Regulatory Milestone as it Reaches a Deal on AI Act

December 9, 20230
Industry News

Black Hat Europe 2023: A Call for Collaborative Efforts

December 9, 20230
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Linux Cybersecurity Engineer

December 10, 20230
Careers

Linux Cybersecurity Engineer

December 10, 20230
Careers

Comcast Cybersecurity: Security Engineer 3

December 10, 20230
Industry News

Unattractive Trends in Health Data Breach: A Look into 2023

December 9, 20230
Industry News

Europe Achieves a Regulatory Milestone as it Reaches a Deal on AI Act

December 9, 20230
Industry News

Black Hat Europe 2023: A Call for Collaborative Efforts

December 9, 20230
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Linux Cybersecurity Engineer
  • Linux Cybersecurity Engineer
  • Comcast Cybersecurity: Security Engineer 3
  • Unattractive Trends in Health Data Breach: A Look into 2023
  • Europe Achieves a Regulatory Milestone as it Reaches a Deal on AI Act

    # TRENDING

    how old is my dell laptophow old is my toshiba laptophow to find computer agehow old is my laptophow old is my computerhow old is my HP laptopverify computer ageWhat is AIGPUSnifferuTorrentwiresharkstar wars theme wallpapersvulnerability scanner downloadTopusb device not recognized windows 10/11 errorWifi Hacking SoftwareWifi Hacking Appstar wars windows 7 theme downloadstar wars windows 10 theme downloadTop Android Hacking AppsThe Best Hacking Books
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures