Oasis Ticket Sales Scams: How to Stay Safe
During our weekly meetings with the banking industry and Police Scotland, we continue to see a significant increase in ticket scams over the last three…
PikaBot is a type of malware that has been gaining notoriety since its emergence in early 2023124. It is a modular trojan, a successor to the infamous QakBot (QBot) trojan, which was widely used by ransomware gangs for its versatile ability to facilitate initial access and deliver secondary payloads1. With the shutdown of QBot, PikaBot has stepped in to fill the void, becoming a tool of choice for cybercriminals1.
PikaBot operates by executing arbitrary commands, downloading additional payloads, and injecting malicious shellcodes into legitimate processes running on a victim’s computer12. This makes it a potent backdoor for attackers to set up for the next stages of their attacks1.
The distribution of PikaBot is primarily through email spam campaigns1. These campaigns are meticulously crafted, utilising geolocalised spam emails that target specific countries1. The emails often contain links to external SMB (Server Message Block) shares, which host malicious zip files1. Once a user interacts with these emails by clicking on the link, they are taken to the SMB share hosting the malicious zip files, resulting in a PikaBot infection1.
Organisations can take several steps to protect themselves from PikaBot:
PikaBot is not just a standalone threat but also a facilitator for other cyber threats. It has been observed being used to distribute other malicious tools such as Cobalt Strike2. Its modular nature, combined with its stealthy distribution methods, makes it a formidable threat to organisations. As PikaBot continues to evolve and gain prevalence, organisations must stay informed and take appropriate measures to protect their systems and data.
In conclusion, the rise of PikaBot represents a significant development in the cyber threat landscape. Its modular nature, combined with its stealthy distribution methods, makes it a formidable threat to organisations. As PikaBot continues to evolve and gain prevalence, organisations must stay informed and take appropriate measures to protect their systems and data.