A new dark web threat, the QBit Stealer, has been unveiled by the QBit Ransomware-as-a-Service (RaaS) group, presenting advanced capabilities for stealing information. This stealer, introduced on October 9, 2023, is designed to acquire files from victim systems, evading detection from on-board security systems. The Cyble Research and Intelligence Labs (CRIL) discovered the source code of the QBit stealer being distributed for free on dark web channels, emphasizing its alleged undetectability by Endpoint Detection and Response solutions (EDRs). The tool showcases its efficiency by swiftly uploading files to Mega[.]nz through an advanced concurrency engine.
Unlike other information stealers in the market, the QBit stealer exhibits a selective approach, targeting specific file extensions, suggesting a potential role as an exfiltration tool in ransomware operations. CRIL’s analysis identified key files in the QBitStealer’s source code, employing anti-debugging and anti-virtualization/sandbox techniques to enhance evasion. The leaked source code includes a batch script and a configuration file outlining critical parameters, such as API credentials for Mega[.]nz authentication, file system paths, stolen folder names, and operation modes.
As a dark web threat, the QBit stealer poses risks due to its features and accessibility to various threat actors, potentially increasing the frequency of cyberattacks. The release of its source code heightens concerns about attracting less sophisticated actors, contributing to a surge in cyber threats. The QBit Stealer aligns with evolving tactics in ransomware attacks, posing a significant threat to users across industries. CRIL recommends mitigating this threat by reinforcing endpoint security with updated EDR solutions, deploying Data Loss Prevention (DLP) solutions, and utilizing reputable antivirus and internet security software on all devices.