- The FBI’s huge Qakbot broke just stopped the era of Malware. It returned with a strong and stealthy
- Employees who attacked the new spam bombings of Casabot are conducting a trick to take off Ransamware inside their companies
- Despite the billions of occupation, far away from Q -law enforcement agencies, the Qiyabot Mastermind remains free in Russia.
In a major cyber crime crackdown, the FBI and international partners announced a victory against Qiyabat in August 2023 – known as QBOT.
The malware operation, which affected more than 700,000 computers globally (including about 200,000 in the United States), was linked to Million 58 million in remedy -related losses.
The US Attorney Martin Estrada “has been described as the most important technical and financial operation so far under the leadership of the Department of Justice against the Boat Net,” Operation Dick Hunt has captured 52 servers and seize Cry 8.6 million Cryptocurrency in the Cryptocurrency, but with a lot of nasal, cyber -crime.
The bouts re -emerge
Within just three months, Qakbot re -appeared, showing that even integrated, resource -related law enforcement measures could have a disappointing impact.
After the talk down of 2023, the alleged Ranglader Rustam Raphailich Gleemov and his staff did not retreat, they shielded – instead of relying on traditional phishing to distribute malware, they allegedly moved to further deception.
And according to RegisterThe new unsafe person has revealed a novel’s strategy that includes “Spam Bomb attacks”.
The attackers then offered to help him deceive the victims to run malicious code.
This resort helped the group access the company’s system, encrypt files and export sensitive data.
The court documents state that “the defendants will launch a spam bomb attack targeted on employees of the affected companies, and will then contact these employees, and present them as information technology workers.”
Once access, the results were sharp and intense: data theft, encryption, and ransom demands.
Qickboat enables malware attackers to backdoor systems, put additional risks, and gives crop credentials.
Following the renamware tension, operators such as Reevil, Black Basta, and County allegedly paid for access to Galemov and his colleagues, or even shared a portion of their exports.
In April 2025, additional illegal funds, more than 30 bitcoin and US $ 700,000 were seized from Galilemov, but it is in Russia beyond the reach of US law enforcement agencies.
As federal officials said, “Unless it decides to give up the protection of the motherland, Galemov is likely to remain untouched.
Staying protected from this type of risks, organizations need to invest in the best anti -virus – additionally, using a key closing point platform can help detect and separate suspicious activity before it increases data violations or ransom attacks.