loader image
- Advertisement -

Saturday, May 18, 2024
75 F
McAllen
- Advertisement -

FBI, Partners Dismantle Qakbot Infrastructure in Multinational Cyber Takedown

Translate text to Spanish or other 102 languages!

- Advertisement -
The Qakbot malware infected victim computers primarily through spam emails that contained malicious attachments or links.  Image for illustration purposes
The Qakbot malware infected victim computers primarily through spam emails that contained malicious attachments or links.  Image for illustration purposes

Texas Border Business

- Advertisement -

Federal Bureau of Investigation

How the Malware Worked 

The Qakbot malware infected victim computers primarily through spam emails that contained malicious attachments or links.  
 
After a user downloaded or clicked the content, Qakbot delivered additional malware—including ransomware—to their computer. The computer also became part of a botnet (a network of compromised computers) and could be controlled remotely by botnet users. All the while, a Qakbot victim was typically unaware that their computer had been infected. 
 
Since its creation in 2008, Qakbot malware has been used in ransomware attacks and other cybercrimes that caused hundreds of millions of dollars in losses to individuals and businesses in the U.S. and abroad. 

- Advertisement -

Watch the FBI Video Below:

“This botnet provided cybercriminals like these with a command-and-control infrastructure consisting of hundreds of thousands of computers used to carry out attacks against individuals and businesses all around the globe,” Wray said. 

Disrupting the Duck 

As part of the operation, the FBI gained lawful access to Qakbot’s infrastructure and identified over 700,000 infected computers worldwide—including more than 200,000 in the U.S.  
 
To disrupt the botnet, the FBI redirected Qakbot traffic to Bureau-controlled servers that instructed infected computers to download an uninstaller file. This uninstaller—created to remove the Qakbot malware—untethered infected computers from the botnet and prevented the installation of any additional malware. 
 
“All of this was made possible by the dedicated work of FBI Los Angeles, our Cyber Division at FBI Headquarters, and our partners, both here at home and overseas,” said Wray. “The cyber threat facing our nation is growing more dangerous and complex every day. But our success proves that our own network and our own capabilities are more powerful.”

- Advertisement -
- Advertisement -
- Advertisement -

Latest News

More Articles Like This

- Advertisement -