Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

New Pikabot Campaign Weaponizes Files

April 3, 2024
Reading Time: 3 mins read
in Alerts
New Pikabot Campaign Weaponizes Files

A new and highly sophisticated malware, known as Pikabot, has emerged, showcasing adaptability and advanced distribution methods since early 2023. McAfee Labs’ latest research reveals Pikabot’s utilization of various file types including HTML, Javascript, and Excel to infiltrate systems worldwide, emphasizing the need for enhanced vigilance and detection capabilities. Pikabot employs a modular design comprising a loader and core component, enabling it to execute commands and inject payloads from a command-and-control server stealthily, reminiscent of the notorious Qakbot malware.

One notable aspect of Pikabot’s strategy is its reliance on meticulously crafted email spam campaigns, similar to other malicious loaders such as QBot and DarkGate. These campaigns, marked by geographically targeted spam emails, lure victims with links to external Server Message Block (SMB) shares hosting malicious zip files, exploiting the SMB protocol for malware distribution. Notably, Pikabot’s distribution tactics underwent a significant shift in February 2024, observed by McAfee Labs, as it diversified its approach to increase the chances of successful infection and evade detection.

The multifaceted distribution campaigns of Pikabot include HTML, Javascript, and Excel file-based attacks, each chosen for its potential to exploit different vulnerabilities and bypass security measures. For instance, HTML campaigns involve zip files containing HTML files, utilizing meta tag refresh for redirection to deploy payloads, while Javascript campaigns leverage compressed zip files with .js files initiating payload retrieval through system processes manipulation. Additionally, Excel campaigns exploit users’ familiarity with the software and cloud services, urging them to click on embedded buttons to access purported files from the cloud.

Reference:
  • Pikabot’s New Campaign Weaponizes HTML, Javascript and Excel Files

Tags: April 2024Cyber AlertCyber Alerts 2024Cyber RiskCyber threatExcelHTMLJavascriptMcAfee LabsPikaBot
ADVERTISEMENT

Related Posts

Interlock Ransomware Threat Alert

Interlock Ransomware Threat Alert

July 24, 2025
Interlock Ransomware Threat Alert

Backdoor Found in WP Plugins

July 24, 2025
Interlock Ransomware Threat Alert

GitLab Patches Key Vulnerabilities

July 24, 2025
Lumma Stealer Returns with New Tactics

npm Phishing Emails Target Developer Logins

July 23, 2025
Lumma Stealer Returns with New Tactics

Lumma Stealer Returns with New Tactics

July 23, 2025
Lumma Stealer Returns with New Tactics

MuddyWater Emerges Amid Iran-Israel Clash

July 23, 2025

Latest Alerts

Interlock Ransomware Threat Alert

GitLab Patches Key Vulnerabilities

Backdoor Found in WP Plugins

Lumma Stealer Returns with New Tactics

npm Phishing Emails Target Developer Logins

MuddyWater Emerges Amid Iran-Israel Clash

Subscribe to our newsletter

    Latest Incidents

    Data Breach Affects 340K Jobseekers

    Hackers Use Ransomware on SharePoint Servers

    Beluga Vodka Ransomware Attack Reported

    Weak Password Triggers Ransomware Old Firm

    US Nuclear Agency Breached in MS Hack

    European Healthcare Network Breached

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial