WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Awareness – IcedID and QBot Malware Continue to Propagate with Various Techniques to Compromise more Victims
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – IcedID and QBot Malware Continue to Propagate with Various Techniques to Compromise more Victims

Author: Alec Davison

Created: Thursday, May 4, 2023 - 18:21

Categories: Cybersecurity

Commodity malware continues to plague businesses and the threat actors employing them are utilizing a diverse toolset of tactics, techniques, and procedures in order to proliferate the malware, such as IcedID and Qbot/Qakbot, and compromise more victims.

Qbot and IcedID are both highly modular malware used for many malicious activities such as credential harvesting, maintaining persistence in a target network, and dropping ransomware. As WaterISAC continues tracking ongoing threat activity leveraging the OneNote distribution method, security researchers at AhnLab recently observed QBot still being distrbuted via OneNote and noted the Windows Help file (CHM) was used in a recently identified attack. Threat actors behind IcedID are also continuing to exploit OneNote to infect victims. In addition, researchers at Menlo Labs observed other campaigns utilizing different distribution methods. One campaign employed HTML smuggling among threat actors to execute IcedID, with the malware being delivered to potential victims via email. Another campaign utilized malvertising to infect victims with IcedID. The last campaign masked IcedID as a ‘Thumbcache Viewer,’ if victims clicked on the program for help, the malware would be executed. Network defenders are encouraged to maintain awareness of the various threats that are being distributed via malicious OneNote files. Read more at Info-Security Magazine.

Additional WaterISAC Reporting on IcedID and/or Qakbot/Qbot:

  • DHS Report on Threat Actors Exploiting OneNote to Deliver Qakbot and IcedID Malware
  • Threat Awareness – Qbot Malware Propagating via Email Hijacking
  • Threat Awareness – Use of Microsoft OneNote to Spread Malicious Payloads Rising
  • Threat Awareness – Black Basta Ransomware Employs Qakbot in Latest Attack Chain
  • Qbot Displaces Emotet as Most Prevalent Malware in December 2022, New Report Finds

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar