A new and highly sophisticated malware, known as Pikabot, has emerged, showcasing adaptability and advanced distribution methods since early 2023. McAfee Labs’ latest research reveals Pikabot’s utilization of various file types including HTML, Javascript, and Excel to infiltrate systems worldwide, emphasizing the need for enhanced vigilance and detection capabilities. Pikabot employs a modular design comprising a loader and core component, enabling it to execute commands and inject payloads from a command-and-control server stealthily, reminiscent of the notorious Qakbot malware.
One notable aspect of Pikabot’s strategy is its reliance on meticulously crafted email spam campaigns, similar to other malicious loaders such as QBot and DarkGate. These campaigns, marked by geographically targeted spam emails, lure victims with links to external Server Message Block (SMB) shares hosting malicious zip files, exploiting the SMB protocol for malware distribution. Notably, Pikabot’s distribution tactics underwent a significant shift in February 2024, observed by McAfee Labs, as it diversified its approach to increase the chances of successful infection and evade detection.
The multifaceted distribution campaigns of Pikabot include HTML, Javascript, and Excel file-based attacks, each chosen for its potential to exploit different vulnerabilities and bypass security measures. For instance, HTML campaigns involve zip files containing HTML files, utilizing meta tag refresh for redirection to deploy payloads, while Javascript campaigns leverage compressed zip files with .js files initiating payload retrieval through system processes manipulation. Additionally, Excel campaigns exploit users’ familiarity with the software and cloud services, urging them to click on embedded buttons to access purported files from the cloud.