Skip to content
Quick exit
  • Cymraeg
  • Reporting SARs
Protecting the public from serious and organised crime
  • Who we are
    • Our mission
    • Our people
    • Our leadership
    • Governance and transparency
    • Inclusion, diversity and equality
    • Publications
  • What we do
    • What we investigate
    • Border vulnerabilities
    • Bribery, corruption and sanctions evasion
    • Cyber crime
    • Child sexual abuse and exploitation
    • Drug trafficking
    • Illegal firearms
    • Fraud
    • Kidnap and extortion
    • Modern slavery and human trafficking
    • Money laundering and illicit finance
    • Organised immigration crime
    • Operation Stovewood: Rotherham child sexual abuse investigation
    • How we work
    • Intelligence: enhancing the picture of serious organised crime affecting the UK
    • Investigating and disrupting the highest risk serious and organised criminals
    • Providing specialist capabilities for law enforcement
    • Supporting victims and survivors
    • National Strategic Assessment for Serious and Organised Crime
  • News
    • All news
  • Careers
    • How to join the NCA
    • Applying and onboarding
    • Current vacancies
    • A day in the life
    • Benefits and support
  • Most Wanted
  • Contact us
    • Verify an NCA Officer
    • Complaints
  • Home >
  • News >
  • Qakbot: cyber crime service taken out in international operation

Share this page:

Share this page:

News

Qakbot: cyber crime service taken out in international operation

  • Cyber crime

An international operation involving the National Crime Agency has led to the takedown of Qakbot malware, which facilitated ransomware attacks and caused millions of pounds worth of damage worldwide.

Qakbot malware (also known as ‘Qbot’ and ‘Pinkslipbot’) infected more than 700,000 computers globally, including in the UK, via spam emails.

The operation, led by the FBI and DoJ, saw the seizure of Qakbot’s infrastructure in the US and across Europe on Saturday [26 August], with the NCA ensuring UK servers were taken offline.

US authorities also seized around 8.6 million dollars-worth of illicit cryptocurrency profits.

The administrators behind Qakbot offered access to it for a fee and it was a go-to service for cyber criminals for at least 16 years.

It was used by the criminal groups behind the notorious Conti, ProLock, Egregor, REvil, MegaCortex, and Black Basta ransomware strains to steal personal data, including banking credentials, from victims.

Will Lyne, Head of Cyber Intelligence at the NCA, said: “This investigation has taken out a prolific malware that caused significant damage to victims in the UK and around the world.

“Qakbot was a key enabler within the cyber crime ecosystem, facilitating ransomware attacks and other serious threats.

“The NCA is focused on disrupting the highest harm cyber criminals by targeting the tools and services that underpin their offending.

“This activity demonstrates how, working alongside international partners, we are having an impact on those key enablers and the ransomware business model.”

The NCSC’s Ransomware Hub offers a range of information and guidance aimed at helping organisations defend against ransomware.

29 August 2023

Latest from twitter

Visit the NCA timeline on Twitter

Share this page:

TOP ˄
0370 496 7622
NCA general enquiries or to verify an NCA officer, available 24/7
Click CEOP logo: Advice, Help, Report
  • Who we are

  • Our mission
  • What we do

  • How we investigate
  • How we work
  • News

  • Most wanted

  • Careers

  • A day in the life
  • Current vacancies
  • Contact us

  • Operation Stovewood
  • Suspicious activity reports
  • Verify an NCA officer
  • Complaints

Follow us

  • Sitemap
  • Privacy and Cookie Policy
  • Terms and Conditions
  • Publications
  • Accessibility statement
© Crown Copyright
© Crown Copyright