{"id":600,"date":"2022-03-25T08:32:17","date_gmt":"2022-03-25T08:32:17","guid":{"rendered":"https:\/\/fortgale.com\/threats\/?page_id=600"},"modified":"2024-01-03T08:59:41","modified_gmt":"2024-01-03T08:59:41","slug":"malware","status":"publish","type":"page","link":"https:\/\/fortgale.com\/threats\/malware\/","title":{"rendered":"Malware"},"content":{"rendered":"<div data-colibri-id=\"600-c1\" class=\"style-416 style-local-600-c1 position-relative\">\n  \n  <div data-colibri-component=\"section\" data-colibri-id=\"600-c2\" id=\"malware-1\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-1581 style-local-600-c2 position-relative\">\n    \n    \n    <div class=\"h-section-grid-container h-section-boxed-container\">\n      \n      <div data-colibri-id=\"600-c3\" class=\"h-row-container gutters-row-lg-1 gutters-row-md-1 gutters-row-0 gutters-row-v-lg-1 gutters-row-v-md-1 gutters-row-v-1 style-1541 style-local-600-c3 position-relative\">\n        \n        <div class=\"h-row justify-content-lg-start justify-content-md-start justify-content-start align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-1 gutters-col-md-1 gutters-col-0 gutters-col-v-lg-1 gutters-col-v-md-1 gutters-col-v-1\">\n          \n          <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1583-outer style-local-600-c4-outer\">\n            <div data-colibri-id=\"600-c4\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1583 style-local-600-c4 position-relative\">\n              \n              \n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                \n                <div data-colibri-id=\"600-c5\" class=\"h-global-transition-all h-heading style-328 style-local-600-c5 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-328 style-local-600-c5\">\n                    \n                    \n                    <h3 class=\"\">Malware EMOTET<\/h3>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c6\" class=\"h-lead h-text h-text-component style-1108 style-local-600-c6 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p><span style=\"font-weight: 700\">Alias: Geodo ; Heodo<\/span><\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c7\" class=\"h-text h-text-component style-329 style-local-600-c7 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p>Emotet, active since 2014, is among the malware most used by criminals to compromise the <strong><u>workstations of Italian companies.<\/u><\/strong><\/p>\n                    <p>After installation on the victim system, it\n                      <u> steals the passwords saved in the browsers<\/u> (banking logins, e-mail, company portals). It is often used as a &#8220;Trojan horse&#8221; for the installation of other types of Malware (Trickbot or IcedID).<\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c8\" class=\"h-global-transition-all h-heading style-1574 style-local-600-c8 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-1574 style-local-600-c8\">\n                    \n                    \n                    <h6 class=\"\">Sources:<\/h6>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c9\" class=\"h-x-container style-1592 style-local-600-c9 position-relative h-element\">\n                  \n                  <div class=\"h-x-container-inner style-dynamic-600-c9-group style-1592-spacing style-local-600-c9-spacing\"><span class=\"h-button__outer style-1115-outer style-local-600-c10-outer d-inline-flex h-element\"><a href=\"https:\/\/fortgale.com\/news\/?s=emotet\" data-colibri-id=\"600-c10\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1115 style-local-600-c10 position-relative\"><!--&gt;--> <span>Fortgale Analysis<\/span><\/a>\n                    <\/span><span class=\"h-button__outer style-1576-outer style-local-600-c11-outer d-inline-flex h-element\"><a href=\"https:\/\/attack.mitre.org\/software\/S0367\/\" data-colibri-id=\"600-c11\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1576 style-local-600-c11 position-relative\"><!--&gt;--> <span>Mitre<\/span><\/a>\n                    <\/span><span class=\"h-button__outer style-1576-outer style-local-600-c12-outer d-inline-flex h-element\"><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.emotet\" data-colibri-id=\"600-c12\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1576 style-local-600-c12 position-relative\"><!--&gt;--> <span>Malpedia<\/span><\/a>\n                    <\/span>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c13\" class=\"style-1600 style-local-600-c13 position-relative h-element\">\n                  \n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n          <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1584-outer style-local-600-c14-outer\">\n            <div data-colibri-id=\"600-c14\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1584 style-local-600-c14 position-relative\">\n              \n              \n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                \n                <div data-colibri-id=\"600-c15\" class=\"h-global-transition-all h-heading style-328 style-local-600-c15 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-328 style-local-600-c15\">\n                    \n                    \n                    <h3 class=\"\">Malware TRICKBOT<\/h3>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c16\" class=\"h-lead h-text h-text-component style-1108 style-local-600-c16 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p><span style=\"font-weight: 700\">Alias: Trickster, TheTrick, TrickLoader<\/span><\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c17\" class=\"h-text h-text-component style-329 style-local-600-c17 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p><strong>Trickbot<\/strong>, active since 2016, is a modular banking Trojan developed by <strong>WIZARD SPIDER<\/strong> with the main purpose of stealing <strong>victims&#8217; credentials<\/strong>. Over the years, businesses and individuals\n                      on a global scale have been affected.<\/p>\n                    <p>Following infection (usually via spearphishing) it allows the implementation of additional functionality, such as\n                      <u>data collection, reconnaissance and lateral movement in the victim&#8217;s local network.<\/u>\n                    <\/p>\n                    <p>It is often used as initial access which can then be sold to other criminal groups.<\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c18\" class=\"h-global-transition-all h-heading style-1574 style-local-600-c18 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-1574 style-local-600-c18\">\n                    \n                    \n                    <h6 class=\"\">Sources:<\/h6>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c19\" class=\"h-x-container style-1596 style-local-600-c19 position-relative h-element\">\n                  \n                  <div class=\"h-x-container-inner style-dynamic-600-c19-group style-1596-spacing style-local-600-c19-spacing\"><span class=\"h-button__outer style-1115-outer style-local-600-c20-outer d-inline-flex h-element\"><a href=\"https:\/\/fortgale.com\/news\/?s=trickbot\" data-colibri-id=\"600-c20\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1115 style-local-600-c20 position-relative\"><!--&gt;--> <span>Fortgale Analysis<\/span><\/a>\n                    <\/span><span class=\"h-button__outer style-1576-outer style-local-600-c21-outer d-inline-flex h-element\"><a href=\"https:\/\/attack.mitre.org\/software\/S0266\/\" data-colibri-id=\"600-c21\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1576 style-local-600-c21 position-relative\"><!--&gt;--> <span>Mitre<\/span><\/a>\n                    <\/span><span class=\"h-button__outer style-1576-outer style-local-600-c22-outer d-inline-flex h-element\"><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.trickbot\" data-colibri-id=\"600-c22\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1576 style-local-600-c22 position-relative\"><!--&gt;--> <span>Malpedia<\/span><\/a>\n                    <\/span>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c23\" class=\"style-1600 style-local-600-c23 position-relative h-element\">\n                  \n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n          <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1589-outer style-local-600-c24-outer\">\n            <div data-colibri-id=\"600-c24\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1589 style-local-600-c24 position-relative\">\n              \n              \n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                \n                <div data-colibri-id=\"600-c25\" class=\"h-global-transition-all h-heading style-328 style-local-600-c25 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-328 style-local-600-c25\">\n                    \n                    \n                    <h3 class=\"\">Malware URSNIF<\/h3>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c26\" class=\"h-lead h-text h-text-component style-1108 style-local-600-c26 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p><span style=\"font-weight: 700\">Alias: Gozi, CRM, Gozi CRM, Papras, Snifula<\/span><\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c27\" class=\"h-text h-text-component style-329 style-local-600-c27 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p><strong>Ursnif<\/strong> is one of the most widespread malware in Italy, every year there are several\n                      <u>campaigns targeting Italian companies.<\/u>\n                    <\/p>\n                    <p>The first samples were detected in 2015 and in recent years its functionality has undergone variations, but the method of propagation and infection has remained the same. It usually exploits a malicious attachment within phishing emails\n                      to install itself on victims&#8217; systems.<\/p>\n                    <p>Its main functions consist of stealing information relating to banks, wallets and cryptocurrencies; Furthermore, it can also perform further operations such as:\n                      <u>obtaining other information relating to the user, creating screenshots and web injections.<\/u>\n                    <\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c28\" class=\"h-global-transition-all h-heading style-1574 style-local-600-c28 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-1574 style-local-600-c28\">\n                    \n                    \n                    <h6 class=\"\">Sources:<\/h6>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c29\" class=\"h-x-container style-1601 style-local-600-c29 position-relative h-element\">\n                  \n                  <div class=\"h-x-container-inner style-dynamic-600-c29-group style-1601-spacing style-local-600-c29-spacing\"><span class=\"h-button__outer style-1115-outer style-local-600-c30-outer d-inline-flex h-element\"><a href=\"https:\/\/fortgale.com\/news\/?s=ursnif\" data-colibri-id=\"600-c30\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1115 style-local-600-c30 position-relative\"><!--&gt;--> <span>Fortgale Analys<\/span><\/a>\n                    <\/span><span class=\"h-button__outer style-1576-outer style-local-600-c31-outer d-inline-flex h-element\"><a href=\"https:\/\/attack.mitre.org\/software\/S0386\/\" data-colibri-id=\"600-c31\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1576 style-local-600-c31 position-relative\"><!--&gt;--> <span>Mitre<\/span><\/a>\n                    <\/span><span class=\"h-button__outer style-1576-outer style-local-600-c32-outer d-inline-flex h-element\"><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.gozi\" data-colibri-id=\"600-c32\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1576 style-local-600-c32 position-relative\"><!--&gt;--> <span>Malpedia<\/span><\/a>\n                    <\/span>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c33\" class=\"style-1600 style-local-600-c33 position-relative h-element\">\n                  \n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n  <div data-colibri-component=\"section\" data-colibri-id=\"600-c38\" id=\"malware-2\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-1605 style-local-600-c38 position-relative\">\n    \n    \n    <div class=\"h-section-grid-container h-section-boxed-container\">\n      \n      <div data-colibri-id=\"600-c39\" class=\"h-row-container gutters-row-lg-1 gutters-row-md-1 gutters-row-0 gutters-row-v-lg-1 gutters-row-v-md-1 gutters-row-v-1 style-1541 style-local-600-c39 position-relative\">\n        \n        <div class=\"h-row justify-content-lg-start justify-content-md-start justify-content-start align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-1 gutters-col-md-1 gutters-col-0 gutters-col-v-lg-1 gutters-col-v-md-1 gutters-col-v-1\">\n          \n          <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1583-outer style-local-600-c40-outer\">\n            <div data-colibri-id=\"600-c40\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1583 style-local-600-c40 position-relative\">\n              \n              \n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                \n                <div data-colibri-id=\"600-c41\" class=\"h-global-transition-all h-heading style-328 style-local-600-c41 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-328 style-local-600-c41\">\n                    \n                    \n                    <h3 class=\"\">Malware AGENT TESLA<\/h3>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c42\" class=\"h-lead h-text h-text-component style-1108 style-local-600-c42 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p><span style=\"font-weight: 700\">Alias: AgenTesla, AgentTesla, Negasteal<\/span><\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c43\" class=\"h-text h-text-component style-329 style-local-600-c43 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p><strong>Agent Tesla<\/strong> is spyware capable of stealing information relating to browser credentials, FTP services, Windows, emails and VPNs.<\/p>\n                    <p>Over time, other features have also been developed such as:\n                      <u> collection of information regarding the hardware of the victim&#8217;s systems, creation of screenshots, download and execution of additional executables, log of pressed keys and clipboard.<\/u>\n                    <\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c44\" class=\"h-global-transition-all h-heading style-1574 style-local-600-c44 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-1574 style-local-600-c44\">\n                    \n                    \n                    <h6 class=\"\">Sources:<\/h6>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c45\" class=\"h-x-container style-1592 style-local-600-c45 position-relative h-element\">\n                  \n                  <div class=\"h-x-container-inner style-dynamic-600-c45-group style-1592-spacing style-local-600-c45-spacing\"><span class=\"h-button__outer style-1115-outer style-local-600-c46-outer d-inline-flex h-element\"><a href=\"https:\/\/fortgale.com\/news\/?s=agenttesla\" data-colibri-id=\"600-c46\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1115 style-local-600-c46 position-relative\"><!--&gt;--> <span>Fortgale Analysis<\/span><\/a>\n                    <\/span><span class=\"h-button__outer style-1576-outer style-local-600-c47-outer d-inline-flex h-element\"><a href=\"https:\/\/attack.mitre.org\/software\/S0331\/\" data-colibri-id=\"600-c47\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1576 style-local-600-c47 position-relative\"><!--&gt;--> <span>Mitre<\/span><\/a>\n                    <\/span><span class=\"h-button__outer style-1576-outer style-local-600-c48-outer d-inline-flex h-element\"><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.agent_tesla\" data-colibri-id=\"600-c48\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1576 style-local-600-c48 position-relative\"><!--&gt;--> <span>Malpedia<\/span><\/a>\n                    <\/span>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c49\" class=\"style-1600 style-local-600-c49 position-relative h-element\">\n                  \n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n          <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1584-outer style-local-600-c50-outer\">\n            <div data-colibri-id=\"600-c50\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1584 style-local-600-c50 position-relative\">\n              \n              \n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                \n                <div data-colibri-id=\"600-c51\" class=\"h-global-transition-all h-heading style-328 style-local-600-c51 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-328 style-local-600-c51\">\n                    \n                    \n                    <h3 class=\"\">Malware FORMBOOK<\/h3>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c52\" class=\"h-lead h-text h-text-component style-1108 style-local-600-c52 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p><strong style=\"font-weight: 700\">Alias: <\/strong><span style=\"font-weight: 700\">win.xloader<\/span><\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c53\" class=\"h-text h-text-component style-329 style-local-600-c53 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p><strong>Formbook<\/strong> is a Data Stealer distributed as <strong>Maas<\/strong> (\n                      <u>Malware as a Services<\/u>) active since 2016, which aims to exfiltrate victims&#8217; credentials and personal information. It provides less experienced attackers with the possibility of carrying out attack campaigns in just a few clicks\n                      by renting it at relatively low prices (a few hundred euros).<\/p>\n                    <p>Over time, the malware has undergone numerous\n                      <u>updates<\/u> and is often distributed via\n                      <u>malspam<\/u> campaigns and malicious attachments.<\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c54\" class=\"h-global-transition-all h-heading style-1574 style-local-600-c54 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-1574 style-local-600-c54\">\n                    \n                    \n                    <h6 class=\"\">Sources:<\/h6>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c55\" class=\"h-x-container style-1596 style-local-600-c55 position-relative h-element\">\n                  \n                  <div class=\"h-x-container-inner style-dynamic-600-c55-group style-1596-spacing style-local-600-c55-spacing\"><span class=\"h-button__outer style-1115-outer style-local-600-c56-outer d-inline-flex h-element\"><a href=\"https:\/\/fortgale.com\/news\/?s=formbook\" data-colibri-id=\"600-c56\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1115 style-local-600-c56 position-relative\"><!--&gt;--> <span>Fortgale Analysis<\/span><\/a>\n                    <\/span><span class=\"h-button__outer style-1576-outer style-local-600-c57-outer d-inline-flex h-element\"><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.formbook\" data-colibri-id=\"600-c57\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1576 style-local-600-c57 position-relative\"><!--&gt;--> <span>Malpedia<\/span><\/a>\n                    <\/span>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c58\" class=\"style-1600 style-local-600-c58 position-relative h-element\">\n                  \n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n          <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1589-outer style-local-600-c59-outer\">\n            <div data-colibri-id=\"600-c59\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1589 style-local-600-c59 position-relative\">\n              \n              \n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                \n                <div data-colibri-id=\"600-c60\" class=\"h-global-transition-all h-heading style-328 style-local-600-c60 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-328 style-local-600-c60\">\n                    \n                    \n                    <h3 class=\"\">Malware QAKBOT<\/h3>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c61\" class=\"h-lead h-text h-text-component style-1108 style-local-600-c61 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p><span style=\"font-weight: 700\">Alias: Pinkslipbot, Qbot, Quakbot<\/span><\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c62\" class=\"h-text h-text-component style-329 style-local-600-c62 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p><strong>QakBot<\/strong> is a <strong>modular banking Trojan <\/strong>that has been active since 2007.<\/p>\n                    <p>Over time it has undergone several changes, going from being a &#8220;simple&#8221; info stealer to becoming a dropper for some ransomware such as ProLock and Egregor.<\/p>\n                    <p>However, the infection system has remained almost unchanged, exploiting malspam campaigns with malicious attachments or links.<\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c63\" class=\"h-global-transition-all h-heading style-1574 style-local-600-c63 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-1574 style-local-600-c63\">\n                    \n                    \n                    <h6 class=\"\">Sources:<\/h6>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c64\" class=\"h-x-container style-1601 style-local-600-c64 position-relative h-element\">\n                  \n                  <div class=\"h-x-container-inner style-dynamic-600-c64-group style-1601-spacing style-local-600-c64-spacing\"><span class=\"h-button__outer style-1115-outer style-local-600-c65-outer d-inline-flex h-element\"><a href=\"https:\/\/fortgale.com\/news\/?s=qakbt\" data-colibri-id=\"600-c65\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1115 style-local-600-c65 position-relative\"><!--&gt;--> <span>Fortgale Analysis<\/span><\/a>\n                    <\/span><span class=\"h-button__outer style-1576-outer style-local-600-c66-outer d-inline-flex h-element\"><a href=\"https:\/\/attack.mitre.org\/software\/S0650\/\" data-colibri-id=\"600-c66\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1576 style-local-600-c66 position-relative\"><!--&gt;--> <span>Mitre<\/span><\/a>\n                    <\/span><span class=\"h-button__outer style-1576-outer style-local-600-c67-outer d-inline-flex h-element\"><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.qakbot\" data-colibri-id=\"600-c67\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1576 style-local-600-c67 position-relative\"><!--&gt;--> <span>Malpedia<\/span><\/a>\n                    <\/span>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"600-c68\" class=\"style-1600 style-local-600-c68 position-relative h-element\">\n                  \n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Malware EMOTET Alias: Geodo ; Heodo Emotet, active since 2014, is among the malware most used by criminals to compromise the workstations of Italian companies. After installation on the victim system, it steals the passwords saved in the browsers (banking logins, e-mail, company portals). It is often used as a &#8220;Trojan horse&#8221; for the installation [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":625,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/full-width-page.php","meta":{"footnotes":""},"class_list":["post-600","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fortgale and Cyber Threats - Malware<\/title>\n<meta name=\"description\" content=\"Informazioni tecniche relative a Malware, Ransomware, strumenti offensivi e tecniche di compromissione.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fortgale and Cyber Threats - Malware\" \/>\n<meta property=\"og:description\" content=\"Informazioni tecniche relative a Malware, Ransomware, strumenti offensivi e tecniche di compromissione.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fortgale.com\/threats\/malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Fortgale and Cyber Threats\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-03T08:59:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2021\/10\/EMOTET.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/malware\\\/\",\"url\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/malware\\\/\",\"name\":\"Fortgale and Cyber Threats - Malware\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/10\\\/EMOTET.png\",\"datePublished\":\"2022-03-25T08:32:17+00:00\",\"dateModified\":\"2024-01-03T08:59:41+00:00\",\"description\":\"Informazioni tecniche relative a Malware, Ransomware, strumenti offensivi e tecniche di compromissione.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/malware\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fortgale.com\\\/threats\\\/malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/10\\\/EMOTET.png\",\"contentUrl\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/10\\\/EMOTET.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#website\",\"url\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/\",\"name\":\"Fortgale and Cyber Threats\",\"description\":\"Fortgale Threats, ATT&amp;CK, Malware...\",\"publisher\":{\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#organization\",\"name\":\"Fortgale\",\"url\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2022\\\/04\\\/logo_blu.png\",\"contentUrl\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2022\\\/04\\\/logo_blu.png\",\"width\":558,\"height\":125,\"caption\":\"Fortgale\"},\"image\":{\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fortgale and Cyber Threats - Malware","description":"Informazioni tecniche relative a Malware, Ransomware, strumenti offensivi e tecniche di compromissione.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"it_IT","og_type":"article","og_title":"Fortgale and Cyber Threats - Malware","og_description":"Informazioni tecniche relative a Malware, Ransomware, strumenti offensivi e tecniche di compromissione.","og_url":"https:\/\/fortgale.com\/threats\/malware\/","og_site_name":"Fortgale and Cyber Threats","article_modified_time":"2024-01-03T08:59:41+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2021\/10\/EMOTET.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fortgale.com\/threats\/malware\/","url":"https:\/\/fortgale.com\/threats\/malware\/","name":"Fortgale and Cyber Threats - Malware","isPartOf":{"@id":"https:\/\/fortgale.com\/threats\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fortgale.com\/threats\/malware\/#primaryimage"},"image":{"@id":"https:\/\/fortgale.com\/threats\/malware\/#primaryimage"},"thumbnailUrl":"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2021\/10\/EMOTET.png","datePublished":"2022-03-25T08:32:17+00:00","dateModified":"2024-01-03T08:59:41+00:00","description":"Informazioni tecniche relative a Malware, Ransomware, strumenti offensivi e tecniche di compromissione.","breadcrumb":{"@id":"https:\/\/fortgale.com\/threats\/malware\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fortgale.com\/threats\/malware\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/fortgale.com\/threats\/malware\/#primaryimage","url":"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2021\/10\/EMOTET.png","contentUrl":"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2021\/10\/EMOTET.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/fortgale.com\/threats\/malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fortgale.com\/threats\/"},{"@type":"ListItem","position":2,"name":"Malware"}]},{"@type":"WebSite","@id":"https:\/\/fortgale.com\/threats\/#website","url":"https:\/\/fortgale.com\/threats\/","name":"Fortgale and Cyber Threats","description":"Fortgale Threats, ATT&amp;CK, Malware...","publisher":{"@id":"https:\/\/fortgale.com\/threats\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fortgale.com\/threats\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/fortgale.com\/threats\/#organization","name":"Fortgale","url":"https:\/\/fortgale.com\/threats\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/fortgale.com\/threats\/#\/schema\/logo\/image\/","url":"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2022\/04\/logo_blu.png","contentUrl":"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2022\/04\/logo_blu.png","width":558,"height":125,"caption":"Fortgale"},"image":{"@id":"https:\/\/fortgale.com\/threats\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/pages\/600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/comments?post=600"}],"version-history":[{"count":20,"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/pages\/600\/revisions"}],"predecessor-version":[{"id":3259,"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/pages\/600\/revisions\/3259"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/media\/625"}],"wp:attachment":[{"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/media?parent=600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}