← Glossary

QakBot
 


 

QakBot is a sophisticated banking trojan that has evolved into a versatile malware platform. QakBot is also known as Qbot or Pinkslipbot. Initially targeting financial institutions, it now poses significant risks to various sectors, including enterprises developing mobile applications. Understanding QakBot's mechanisms and implications is crucial for developers and organizations focused on mobile app security.

QakBot’s Origins and Evolution

QakBot has undergone significant transformations since its discovery, adapting to modern security defenses and expanding its scope beyond its original function as a banking trojan. Understanding its origins and progression is essential to grasp its impact on enterprise security.

  • Initial Emergence as a Banking Trojan: First identified in 2008, QakBot (also known as Qbot or Pinkslipbot) was designed primarily to target financial data. It functioned by injecting itself into browser processes to steal online banking credentials and session cookies. Early variants employed keylogging, HTML injection, and man-in-the-browser techniques to intercept user inputs on banking portals, with a primary focus on credential theft and wire fraud.
  • Transition to Modular Malware Platform: Over time, QakBot evolved into a highly modular and polymorphic malware platform. It incorporated capabilities such as network propagation via SMB, credential harvesting from memory (similar to Mimikatz), and lateral movement within enterprise environments. Later versions included sophisticated anti-analysis features, command-and-control encryption, and the ability to deliver secondary payloads, such as ransomware (e.g., ProLock, Egregor, and Conti). These enhancements enabled attackers to monetize infections beyond data theft, using QakBot as a gateway for full-blown ransomware attacks.

QakBot's evolution from a niche banking trojan to a versatile threat actor toolkit demonstrates its developers’ commitment to adaptability and evasion. Its continuous updates, modular design, and integration into broader cybercriminal ecosystems make it a persistent and dangerous malware, with profound implications for enterprises and their mobile app environments.

QakBot’s Infection Vectors and Techniques

QakBot employs multiple infection vectors, such as phishing emails with malicious attachments or links. Once executed, it uses techniques such as code injection and process hollowing to evade detection. Its ability to propagate through networks and update itself complicates efforts to mitigate its impact.

  • Credential Theft and Session Hijacking: QakBot’s primary tactic involves harvesting user credentials and session tokens by injecting malicious code into legitimate processes. Once these are exfiltrated from an enterprise system, attackers can gain unauthorized access to mobile backend services, APIs, or user accounts. This creates a risk where compromised sessions could be used to impersonate legitimate users, escalate privileges, or access sensitive data stored or processed by mobile apps. Mobile developers must ensure token expiration policies, implement refresh token rotation, and integrate real-time session monitoring to detect anomalies.
  • Compromised Backend Infrastructure: If QakBot infiltrates a corporate network, it may compromise backend systems supporting mobile applications, such as authentication servers, database servers, or analytics services. This exposure allows attackers to inject malicious code into data streams, redirect API calls, or corrupt application logic. Developers should validate all backend responses on the mobile client, apply digital signatures to app data, and use certificate pinning to prevent man-in-the-middle attacks even from within seemingly trusted networks.
  • Secure Integration with Enterprise Identity Providers: As enterprises increasingly utilize federated identity systems, such as Active Directory, QakBot’s ability to harvest domain credentials poses a significant threat. Developers integrating with enterprise Single Sign-On (SSO) must enforce strict token scope limitations and verify identity claims using dedicated verification endpoints. App-side enforcement of permissions and regular validation of user roles are also necessary to prevent misuse in case of stolen credentials.
  • Development Environment Security: QakBot often targets developer machines to steal credentials, code signing certificates, or access tokens. Mobile developers must secure their local environments with endpoint protection, segregate dev and prod access, and avoid storing secrets in plaintext or within repositories. Use of secure build pipelines with hardware-backed key storage can mitigate the risk of tampering.

While QakBot does not directly infect mobile devices, its ability to exploit enterprise ecosystems poses a substantial risk to mobile applications. Developers must proactively harden both their code and the systems their applications interact with, understanding that even indirect exposure to malware can have severe downstream consequences for mobile app security and user trust.

Best Practices for QakBot Mitigation

Understanding how to mitigate QakBot threats requires a multi-layered security strategy that addresses both prevention and detection. Below are key technical best practices enterprise developers and security teams should implement to reduce exposure to QakBot attacks.

  • Secure Application Development Practices: Developers must adopt a security-by-design approach when building mobile and enterprise applications. This includes rigorous input validation, context-aware output encoding, secure session management, and encrypted data storage. Minimizing attack surfaces—by limiting permissions, avoiding insecure third-party SDKs, and reducing unnecessary code dependencies—can restrict opportunities for malware like QakBot to exploit system weaknesses or access sensitive credentials.
  • Email and Endpoint Protection: Since QakBot typically enters networks via phishing emails, enterprises should deploy advanced email filtering with sandboxing capabilities to block malicious attachments and links. Endpoint Detection and Response (EDR) tools should be installed on both desktops and developer machines to monitor for indicators of compromise (IOCs), such as DLL injections or unauthorized PowerShell activity. Integrating Endpoint Detection and Response (EDR) with Security Information and Event Management (SIEM) systems can enhance real-time visibility and facilitate automated threat response.
  • Network Hardening and Segmentation: Isolating sensitive environments, such as build servers, mobile CI/CD pipelines, and production databases, prevents lateral movement of malware. Implementing network segmentation, access controls via firewalls, and using VPNs for remote access all limit exposure. Monitoring network traffic for unusual patterns, such as command-and-control (C2) communication or data exfiltration, is critical in detecting QakBot post-compromise behavior.
  • Authentication and Access Control: Implementing Multi-Factor Authentication (MFA) across all enterprise and development systems significantly hinders credential-based propagation of QakBot. Least privilege access should be enforced for both human users and service accounts. For mobile apps, OAuth 2.0 and OpenID Connect should be used to manage secure access tokens and prevent session hijacking.
  • User Training and Incident Response: Training employees and developers to recognize phishing attempts is essential. Simulated phishing campaigns, along with transparent reporting processes, help reinforce secure behavior. Incident response plans should include playbooks for isolating infected hosts, revoking exposed credentials, and executing post-mortem forensic analysis.

Mitigating QakBot requires an enterprise-wide effort that blends secure software development, endpoint and network defense, access control, and user awareness. By proactively addressing these areas with robust policies and technical controls, organizations can reduce the risk of QakBot infiltration and safeguard their mobile applications and broader digital infrastructure.

Conclusion

QakBot's evolution from a banking trojan to a multifaceted malware platform underscores the dynamic nature of cybersecurity threats. For mobile app developers and enterprises, understanding and mitigating such threats is imperative. By adopting comprehensive security strategies and staying informed about emerging threats, organizations can safeguard their mobile applications and protect sensitive data from malicious actors.

What Are The Major Banking Trojan Families?

Some of the central banking trojan families have posed significant threats to mobile banking apps and their users. It's essential to stay informed about these threats, their evolving tactics, and the security measures necessary to protect your app and users against them. Regularly updating your app and following security best practices can help mitigate these risks.

  • Anubis: Anubis is an Android banking trojan known for its ability to perform sophisticated financial data theft. It can capture screenshots, record keystrokes, and steal SMS messages, making it highly effective at stealing sensitive banking information. Anubis often masquerades as legitimate apps to trick users.
  • BankBot: BankBot is an Android banking trojan that spreads through fake apps in third-party app stores. It uses overlay attacks to steal login credentials and intercept SMS messages containing OTPs. BankBot has been a persistent threat in the Android ecosystem.
  • BianLian: BianLian is a sophisticated and evolving banking trojan that primarily targets Android devices. First observed in 2018, BianLian is known for its complex and constantly evolving nature, making it a significant challenge for mobile security experts. BianLian employs many common techniques, including SMS interception, the ability to lock the device, and overlay attacks to steal credentials.
  • BrasDex: BrasDex is a sophisticated Android banking trojan that primarily targets banking and financial applications, particularly in Brazil. This trojan has drawn attention because of its ability to manipulate Android’s Accessibility Services, bypass traditional banking security measures, and conduct fraudulent financial transactions through automated systems.
  • Cabassous: Cabassous is a modular banking trojan that can be customized to target specific banks and financial institutions. It is typically distributed through SMS phishing messages that contain a malicious link. Once the link is clicked, the trojan is installed on the victim's device. The trojan attempts to prompt users to enter their login credentials using the overlay attack technique.
  • Cerberus Trojan: Cerberus is an Android banking Trojan available for rent on underground forums. It features keylogging, screen recording, and remote control of infected devices. Cerberus is regularly updated to evade detection and enhance its capabilities.

  • CoperCoper is a modular banking trojan that can be customized to target specific banks and financial institutions. It is typically distributed through SMS phishing messages that contain a malicious link. Once this malware is installed on the user's device, it leverages social engineering and the accessibility services feature to disable Google Play Protect and install additional malicious apps. 
  • Elibomi Malware: Elibomi is Android malware actively targeting users, particularly in India, by masquerading as legitimate applications to steal sensitive personal and financial information. Elibomi typically propagates through SMS phishing (smishing) campaigns.
  • Emotet (formerly a banking trojan): Emotet was initially a banking trojan but has evolved into a multifunctional malware platform. It is primarily distributed through malicious email attachments and has been involved in spreading other malware, including ransomware. Emotet's primary goal is to establish a foothold in a system, which can later be used to deliver other malware payloads, including banking trojans.
  • EventBotEventBot is a sophisticated Android trojan that targets financial apps, including mobile banking apps. It is known for its advanced capabilities and ability to steal sensitive information from infected devices. EventBot's primary goal is to harvest financial data and credentials to carry out fraudulent transactions and illicit activities.
  • ExobotCompact.DExobotCompact.D is a banking trojan that steals sensitive information from mobile banking apps. ExobotCompact.D is also known as Octo. It is a modular malware that can be customized to target specific banks and financial institutions. ExobotCompact.d is typically distributed through SMS phishing messages containing malicious links.
  • FluBot: FluBot is a sophisticated Android banking trojan that spreads via SMS phishing, enticing users to click on malicious links. FluBot first emerged in late 2020 and focuses on stealing sensitive information, particularly banking credentials and personal data.
  • Ginp: Ginp is an Android banking trojan that initially started as a simple SMS stealer but evolved into a more potent threat. It specializes in stealing credit card information by intercepting SMS messages containing card details. Ginp also uses overlay attacks to steal login credentials from banking apps.
  • Marcher: Marcher is another Android-focused banking Trojan active for several years. It primarily spreads through malicious apps or phishing campaigns and can intercept SMS messages containing OTPs. Marcher has a wide range of targets, including banks in multiple countries.
  • Medusa Trojan: The Medusa trojan is a banking trojan that spreads via SMS phishing, enticing users to click on malicious links. Once this trojan is installed, the device user is asked to grant it accessibility services permission, which is used to grant the application more permissions. The trojan features manycapabilities, including keylogging, stealing data from clipboards, screencasting, and sending event logs to a command-and-control server. 
  • Mysterybot: Mysterybot is a sophisticated form of Android malware that emerged in mid-2018, combining the functionalities of a banking trojan, keylogger, and ransomware. It explicitly targets banking applications and can steal sensitive data such as login credentials and financial information.
  • Nexus Trojan: The Nexus trojan is a sophisticated banking malware that primarily targets Android mobile devices, posing a severe threat to mobile app security, especially for enterprises like e-commerce platforms or retail banks. First detected in early 2023, the Nexus trojan is designed to steal sensitive user data, such as banking credentials, two-factor authentication (2FA) codes, and other personal information.
  • Octo: Octo is a banking trojan that steals sensitive data from mobile banking applications. Octo can also be called ExobotCompact.D. It is a modular malware that can be tailored to target specific financial institutions and banks.
  • Pixbankbot: Pixbankbot is a sophisticated banking trojan that targets mobile devices designed to infiltrate financial applications and steal sensitive data.
  • QakBot: QakBot is a sophisticated banking trojan that has evolved into a versatile malware platform. Initially targeting financial institutions, it now poses significant risks to various sectors, including enterprises developing mobile applications.
  • SharkBotSharkBot is a banking trojan that primarily targets money transfers, attempting to exploit the Automatic Transfer Systems (ATS technique that bypasses a bank's multi-factor authentication mechanisms.) When a user tries to transfer funds to another bank account, the malware changes the International Bank Account Number (IBAN entered into the attacker's account.)
  • Svpeng: Svpeng is a banking trojan that primarily targets Android devices. It uses overlay attacks to display fake login screens on top of legitimate apps, including mobile banking apps, to steal user credentials. Svpeng is also known for its ransomware capabilities, locking the device and demanding a ransom from the victim.
  • TeaBot: TeaBot is an Android banking trojan targeting the largest number of mobile financial institutions with more standard features. Once on a victim's device, the trojan checks which applications are installed, and once a targeted banking app is discovered, it downloads a payload specifically for that app. TeaBot typically spreads through malicious apps or phishing campaigns.
  • Xenomorph: Xenomorph is a banking trojan that was distributed on the Google Play app store, billed as a "Fast Cleaner" app. More than 50,000 users downloaded Xenomorph. Xenomorph employs many common trojan tactics, such as stealing SMS messages, intercepting notifications, bypassing two-factor authentication, and using overlay attacks to steal credentials. 
  • Zbot: Zbot, also known as Zeus, is one of the most notorious banking trojans. It primarily targets Windows devices but has variants that affect mobile platforms. It is known for its sophisticated capabilities, including keystroke logging, form grabbing (capturing data entered into web forms), and man-in-the-browser attacks. Zbot variants often use social engineering techniques to trick users into downloading malicious files or clicking on malicious links.

Get Insights from Zimperium

Arcu non odio euismod lacinia at quis aliquam etiam erat velit scelerisque in tellus id stella emmy a lacus vestibulum sed arcu non velit feugiat in ante metus dictum at tempor.