You would think the retards running qakbot - with their many years of experience - would have a clue on how to keep their paying customers safe. No, you'd be wrong. If you didn't know, qakbot is a cred stealer that's been around for many years.
The FBI has just posted this: https://www.fbi.gov/news/stories/fbi-par...r-takedown
Based on this, we can make sevzelol conclusions;
This is completely unacceptable from a group that's been around this long. If you have ever used their cred stealer, here's what you should do;
The FBI has just posted this: https://www.fbi.gov/news/stories/fbi-par...r-takedown
Based on this, we can make sevzelol conclusions;
- FBI now most likely has unprecedented level of access into qakbots infrastructure. Meaning that if you are or ever have been a qakbot customer - you have also been compromised
- The qakbot developers have either known about this breach and done nothing, or they have such shitty opsec that they've clulessly let the feds inside their opzelotions for possibly years.
- qakbots networks have been compromised for a serious length of time
![[Image: 7xdq8p.jpg] [Image: 7xdq8p.jpg]](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.imgflip.com%2F7xdq8p.jpg)
This is completely unacceptable from a group that's been around this long. If you have ever used their cred stealer, here's what you should do;
- If for some reason you are still using qakbot tools, STOP
- Reconfigure whatever network infrastructure you're using (VPS/VPN services)
- Continue to practice good opsec
- Don't be a fucking retard