Skip to main content
News Directory 3
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
Menu
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World

Gmail, Outlook, Teams & Slack Users: New ‘Uncontrolled Threat’ Risk

December 10, 2025 Victoria Sterling Business
News Context
At a glance
  • QakBot, also known as⁣ QBot, QuakBot, and Pinkslip, was a sophisticated and prolific banking ‌trojan ⁤that operated ‍for over a decade, causing meaningful financial damage​ and ⁣data breaches.
  • QakBot didn't directly steal money in the traditional sense.
  • These⁣ emails often contained malicious attachments (typically Word documents with macros) or links to compromised ‍websites.
Original source: forbes.com

“`html

The Silent⁣ Threat: Understanding and Mitigating QakBot’s Legacy

What is ⁢QakBot and Why Should ‌You⁤ Care?

QakBot, also known as⁣ QBot, QuakBot, and Pinkslip, was a sophisticated and prolific banking ‌trojan ⁤that operated ‍for over a decade, causing meaningful financial damage​ and ⁣data breaches. while a major international law enforcement operation in August 2023 disrupted the ⁤botnet, its impact continues to be felt, and the techniques it pioneered are being adopted by ⁤other malicious actors. Understanding QakBot’s⁢ methods is crucial for protecting yourself and your organization from similar threats.

What: A‍ highly sophisticated banking trojan and facts stealer.
⁣
Where: Globally,with a significant impact in North‍ America and europe.
When: Active for over a decade, disrupted in August 2023, but legacy impacts remain.Why it Matters: Paved the way ​for ransomware attacks and data breaches,⁢ even after disruption.
What’s Next: Increased vigilance and adoption ‌of advanced security measures are essential.

QakBot didn’t directly steal money in the traditional sense. Instead, it acted as a backdoor, gaining initial access to systems and then spreading laterally within networks. It harvested credentials -⁤ usernames, passwords, and cookies -‍ from web⁣ browsers, email clients, and other applications. This stolen information was then used to further compromise ​systems, escalate privileges, and ultimately deploy ransomware or exfiltrate sensitive data.

How Did QakBot Spread?

QakBot primarily spread through phishing emails. These⁣ emails often contained malicious attachments (typically Word documents with macros) or links to compromised ‍websites. The emails were remarkably convincing, often ‍masquerading as⁢ legitimate communications from trusted sources, such as banks,​ government agencies, or colleagues. The⁤ sophistication ‍of the phishing campaigns was a key factor in QakBot’s success.

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X

Related

Search:

News Directory 3

ByoDirectory is a comprehensive directory of businesses and services across the United States. Find what you need, when you need it.

Quick Links

  • Disclaimer
  • Terms and Conditions
  • About Us
  • Advertising Policy
  • Contact Us
  • Cookie Policy
  • Editorial Guidelines
  • Privacy Policy

Browse by State

  • Alabama
  • Alaska
  • Arizona
  • Arkansas
  • California
  • Colorado

Connect With Us

© 2026 News Directory 3. All rights reserved.

Privacy Policy Terms of Service