Lock like a Pro: How Qakbot Fuels Enterprise Ransomware Campaigns
← Research Hub

Lock like a Pro: How Qakbot Fuels Enterprise Ransomware Campaigns

Group-IB alerted the world to ProLock. Now, it’s exposing the threat actor further.

The ProLock ransomware chain emerged in March 2020 as the successor of PwndLocker and has already made its mark, targeting enterprise networks with ransom demands of up to $1 million. Their main tool for initial access is Qakbot, a banking Trojan that has been linked to a recent spike in Big Game Hunting operations.

In this white paper, you’ll learn:

The complete tactics, techniques, and procedures (TTPs) of ProLock based on the updated MITRE ATT&CK® matrix

How Qakbot evades detection and achieves persistence in a network

Previously unknown details on post-exploitation tools used in the threat actor’s recent campaigns