New variants of Qakbot spread "like wildfire"

The Qakbot worm attack revealed this week that led to theft of personal information belonging to 210,000 unemployed claimants in Massachusetts was not an isolated case.

In fact, infection rates from Qakbot have skyrocketed since the beginning of April, when the worm's authors "seeded new variants," researchers at Symantec said Friday. New variants of Qakbot typically have appeared every few months for the past two years, but not like the latest outbreak.

"It has not been this big of a deal before," Vikram Thakur, principal security response manager at Symantec, told SCMagazineUS.com on  Friday. "They are clearly pushing hard."

Rates have died down since a peak in late April now that anti-virus products have caught up with the new variants, but not before there were hundreds of thousands of infections. (Symantec's endpoint protect initially failed to detect the outbreak in Massachusetts).

"There are several information-stealing trojans or threats out there," Thakur said. "This one is pretty high on the list...Once the malware gets on the computer, it knows very well what to do. There are very few things it relies on its control server for. It has a lot more in-built [than previous variants]."

Qakbot may not have the complexity and name recognition of other data-stealing malware, such as Zeus, but arguably can spread faster. According to Symantec, the worm propagates via network and removable drives and through infected web pages.

"It spreads like wildfire," Thakur said. "This is something that all computer users need to watch out for, especially in corporations because they make use of a lot more impactable propagation vectors. The corporate customers [as opposed to home users] are a little bit more susceptible to getting infected by this worm."

Sign up to our newsletters

More in News

House Intelligence Committee OKs amended version of controversial CISPA

Despite the 18-to-2 vote in favor of the bill proposal, privacy advocates likely will not be satisfied, considering two key amendments reportedly were shot down.

Judge rules hospital can ask ISP for help in ID'ing alleged hackers

The case stems from two incidents where at least one individual is accused of accessing the hospital's network to spread "defamatory" messages to employees.

Three LulzSec members plead guilty in London

Ryan Ackroyd, 26; Jake Davis, 20; and Mustafa al-Bassam, 18, who was not named until now because of his age, all admitted their involvement in the hacktivist gang's attack spree.