WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Awareness – Qbot Malware Propagating via Email Hijacking
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – Qbot Malware Propagating via Email Hijacking

Author: Alec Davison

Created: Tuesday, April 18, 2023 - 18:47

Categories: Cybersecurity

Qbot malware is once again propagating by exploiting companies email chains, allowing the threat actors behind the malware to compromise more victims and conduct other malicious activities, according to security researchers at Kaspersky.

Qbot/Qakbot, which WaterISAC has reported on numerous times, is a highly modular malware used for many malicious activities such as credential harvesting and dropping ransomware. In this latest campaign, threat actors associated with Qbot are exploiting legitimate email correspondence chains to send phishing emails, known as email hijacking, in order to infect a victim with the malware. According to the researchers, the malicious campaign utilizes messages written in different languages, including English, German, Italian and French. To make the emails appear more authentic, the threat actors put the sender’s name from the previous message in the “From” field; however, users can spot this because the sender’s fake e-mail address would be different from that of the original sender. Additionally, the researchers note the fraudulent emails they observed typically urged the recipient to download an attached pdf file, which when a user interacts with the pdf ultimately leads to a Qbot infection. Read more at Info-Security Magazine.

Additional WaterISAC Reporting on Qbot/Qakbot:

  • DHS Report on Threat Actors Exploiting OneNote to Deliver Qakbot and IcedID Malware
  • Threat Awareness – Black Basta Ransomware Employs Qakbot in Latest Attack Chain
  • Qbot Displaces Emotet as Most Prevalent Malware in December 2022, New Report Finds
  • Threat Awareness – Qbot Steals Sensitive Data Minutes after the Initial Infection

Related Resources

Members Only

(TLP:AMBER) April 22, 2026 WaterISAC Cyber Resilience Briefing

Apr 23, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) WaterISAC Notification – CISA Issues Cyber Alert ​​for Supply Chain Compromise Impacting Axios Node Package Manager​

Apr 20, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated April 17, 2026)

Apr 17, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar