www.infosecurity-magazine.com Open in urlscan Pro
13.227.74.121  Public Scan

Submitted URL: https://t.co/uDVp4RkxU6
Effective URL: https://www.infosecurity-magazine.com/news/qbot-tops-december-2022s-most/?utm_source=dlvr.it&utm_medium=twitter
Submission: On February 07 via manual from JP — Scanned from JP

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url(&quot;https://www.google.com/cse/static/images/1x/en/branding.png&quot;) left center no-repeat rgb(255, 255, 255); outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url(&quot;https://www.google.com/cse/static/images/1x/en/branding.png&quot;) left center no-repeat rgb(255, 255, 255); outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Infosecurity Group Websites
 * 
 * Magazine
 * Events
   * Infosecurity Europe
   * Infosecurity Leadership Summit
   * Infosecurity Magazine Events
   * Infosecurity North America
   * Infosecurity Netherlands
   * Infosecurity Belgium
   * Infosecurity Russia
   * Infosecurity Mexico
   * Infosecurity Middle East
 * Insight
   * Infosecurity Webinars
   * Infosecurity Whitepapers
   * Infosecurity Online Summits

 * Log In
 * Sign Up

 * ×
   
   search
    

 * News
 * Magazine Features
 * Opinions
 * News Features
 * Interviews
 * Editorial
 * Blogs
 * Reviews
 * Slackspace
 * Next-Gen Infosec
 * Webinars
 * White Papers
 * Podcasts
 * Industry Events & Training
 * Magazine Events
 * Online Summits
 * Company Directory

 * Application Security
 * Automation
 * Big Data
 * Business Continuity
 * Cloud Security
 * Compliance
 * Cybercrime
 * Data Protection
 * Digital Forensics
 * Encryption
 * Human Factor
 * Identity Access Management
 * Industry Announcements
 * Internet Security
 * Malware
 * Managed Services
 * Mobile Security
 * Network Security
 * Payment Security
 * Physical and Information Security Convergence
 * Privacy
 * Risk Management
 * The Internet of Things
 * Infosec Blog

 * Log In
 * Sign Up


Latest
 * Novel Banking Trojan 'PixPirate' Targets Brazil
 * Iranian Threat Actor Neptunium Associated With Charlie Hebdo Cyber-Attacks
 * Major Florida Hospital Shuts Down Networks, Ransomware Attack Suspected
 * #HowTo: Protect Healthcare Providers' Data
 * Stalkerware Developer Hit with $400K Fine



 *  
 * News
 * Topics
 * Features
 * Webinars
 * White Papers
 * Podcasts
 * Events & Conferences
 * Directory
 * Search
   * ×
     
     search
      


Infosecurity Magazine Home » News » Qbot Overtakes Emotet in December 2022's
Most Wanted Malware List
16 Jan 2023 News


QBOT OVERTAKES EMOTET IN DECEMBER 2022'S MOST WANTED MALWARE LIST

ALESSANDRO MASCELLINO FREELANCE JOURNALIST

 * Email Alessandro
 * Follow @a_mascellino



The Qbot Trojan overtook Emotet as the most prevalent malware found in the wild
in December 2022, impacting 7% of organizations worldwide. Additionally, the
Glupteba malware, a blockchain-enabled Trojan botnet, returned to the top
10 list for the first time since July 2022.

The findings come from Check Point Software Technologies, which published its
Global Threat Index for December 2022 on Friday and shared it with Infosecurity
via email.

“Although Google managed to cause major disruption to Glupteba operations in
December 2021, it seems to have sprung back into action,” reads the report. “As
a modular malware variant, [...] the botnet is often used as a downloader and
dropper for other malware.”

Another piece of malware growing in adoption in December 2022 was the
ad-distributing Android threat known as Hiddad, which entered the top-three
mobile malware list for the first time in 2022, just before the end of the year.

“It repackages legitimate apps and then releases them to a third-party store,”
Check Point wrote. “Its main function is to display ads, but it can also gain
access to key security details built into the OS.”

In terms of industry, education/research remained the most attacked sector
globally last month, followed by government/military and healthcare.

As for the most exploited vulnerabilities in December 2022, a web server flaw
that exposed GitHub repository information was at the top of the list, followed
by various vulnerabilities that leveraged a directory traversal flaw on
different web servers (and that were number one in this list in November 2022).

According to Maya Horowitz, VP of research at Check Point Software, the
overwhelming theme from the company’s latest research is how malware often
masquerades as legitimate software to grant hackers backdoor access to devices
without raising suspicion.

“That is why it is important to do your due diligence when downloading any
software and applications or clicking on links, regardless of how genuine they
look,” Horowitz added.

The latest Global Threat Index by Check Point Software is now available at this
link for more information about the latest active threats in the wild.

The data comes days after security researcher Dominic Alvieri unveiled a new
phishing campaign that relies on social media accounts and fake websites to
pretend to sell the hacking tool, Flipper Zero.


Related to This Story
 * AgentTesla Remains Most Prolific Malware in November, Emotet and Qbot Grow
 * LockBit Dominates Ransomware Campaigns in 2022: Deep Instinct
 * WatchGuard Report: Malware Decreases but Encrypted Malware Up in Q2 2022
 * FormBook Knocks Off Emotet As Most Used Malware in August
 * Hackers Use TrickGate Software to Deploy Emotet, REvil, Other Malware


WHAT’S HOT ON INFOSECURITY MAGAZINE?

 * Read
 * Shared
 * Watched
 * Editor's Choice

1
2 Feb 2023 News


CITY OF LONDON ON HIGH ALERT AFTER RANSOMWARE ATTACK


2
1 Feb 2023 News


THRIVING DARK WEB TRADE IN FAKE SECURITY CERTIFICATIONS


3
3 Feb 2023 News


MALVIRT LOADERS EXPLOIT .NET VIRTUALIZATION TO DELIVER MALVERTISING ATTACKS


4
3 Feb 2023 News


NEW CREDENTIAL-STEALING CAMPAIGN BY APT34 TARGETS MIDDLE EAST FIRMS


5
3 Feb 2023 News


QUARTER OF CFOS HAVE SUFFERED $1M+ BREACHES


6
2 Feb 2023 News


LAZARUS GROUP ATTACK IDENTIFIED AFTER OPERATIONAL SECURITY FAIL



1
31 Jan 2023 News


KILLNET ATTACKERS DDOS US AND DUTCH HOSPITALS


2
2 Feb 2023 News


LAZARUS GROUP ATTACK IDENTIFIED AFTER OPERATIONAL SECURITY FAIL


3
18 Jan 2023 News


CHATGPT CREATES POLYMORPHIC MALWARE


4
1 Feb 2023 News


ALMOST ALL ORGANIZATIONS ARE WORKING WITH RECENTLY BREACHED VENDORS


5
31 Jan 2023 News


DOCUSIGN BRAND IMPERSONATION ATTACK BYPASSES SECURITY MEASURES, TARGETS OVER
10,000


6
3 Feb 2023 News


IT LEADERS REVEAL CYBER FEARS AROUND CHATGPT



1
8 Dec 2022 Webinar


LEARN HOW TO REDUCE BUSINESS COSTS WITH RANSOMWARE READINESS


2
6 Oct 2022 Webinar


THWARTING INSIDER THREATS WITH IAM AND LOG FORENSICS


3
1 Dec 2022 Webinar


HOW A THREAT RESPONSE UNIT UNMASKS A HACKER


4
13 Dec 2022 Webinar


DISCOVER UNKNOWN VULNERABILITIES WITH CROWDSOURCED SECURITY


5
10 Nov 2022 Webinar


LEVERAGING ENDPOINT SECURITY TO NAVIGATE THE MODERN THREAT LANDSCAPE


6
24 Nov 2022 Webinar


HOW TO BUILD CYBER RESILIENCE ACROSS THE ENTIRE WORKFORCE



1
11 Jan 2023 News


OVER 100 CVES ADDRESSED IN FIRST PATCH TUESDAY OF 2023


2
9 Jan 2023 News Feature


THE LASTPASS BREACHES: PASSWORD MANAGERS IN THE SPOTLIGHT


3
9 Jan 2023 Opinion


#HOWTO: COLLABORATE WITHOUT SHARING DATA


4
5 Jan 2023 News


OVER 200 MILLION TWITTER USERS' DETAILS LEAKED ON HACKER FORUM


5
5 Jan 2023 News


FIVE GUYS DISCLOSES DATA BREACH AFFECTING EMPLOYEE PII


6
5 Jan 2023 Opinion


CYBER INSURANCE: A MUST HAVE, NOT A NICE TO HAVE




 * The Magazine
 * About Infosecurity
 * Subscription
 * Meet the Team
 * Contact Us
 * Cookies Settings

 * Advertisers
 * Media Pack

 * Contributors
 * Forward Features
 * Op-ed
 * Next-Gen Submission

 * Copyright © 2023 Reed Exhibitions Ltd.
 * Terms and Conditions
 * Privacy Policy
 * Intellectual property statement
 * Cookie Policy
 * Sitemap
 * 

Please wait…







We use cookies to analyse and improve our service, to improve and personalise
content, advertising and your digital experience. We also share information
about your use of our site with our social media, advertising and analytics
partners. Cookie Policy

Accept All Cookies
Cookies Settings



COOKIE PREFERENCE CENTRE

We process your information, to deliver content or advertisements and measure
the delivery of such content or advertisements, extract insights, and generate
reports to understand service usage; and/or accessing or storing information on
devices for that purpose.

You can choose not to allow some types of cookies. However, blocking some types
of cookies may impact your experience of the site and the services we are able
to offer. Click on the different category headings to find out more, to change
our default settings, and/or view the list of Google Ad-Tech Vendors.


Cookie Policy



MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active
Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.



Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. If you do not allow these cookies, you will
experience less targeted advertising.

Cookies Details‎

UNCATEGORISED COOKIES

Uncategorised cookies

Uncategorised cookies are cookies that we are in the process of classifying,
together with the providers of individual cookies.

Cookies Details‎
Confirm My Choices

Back Button

Back


PERFORMANCE COOKIES



Vendor Search Search Icon Filter Icon


Clear Filters

Information storage and access
Apply
Consent Leg.Interest

All Consent Allowed

Select All Vendors
Select All Vendors
All Consent Allowed

 * HOST DESCRIPTION
   
   View Cookies
   
   REPLACE-WITH-DYANMIC-HOST-ID
    * Name
      cookie name

Confirm My Choices