Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks

An analysis of the “evasive and tenacious” malware known as QBot has revealed that 25% of its command-and-control (C2) servers are merely active for a single day.
What’s more, 50% of the servers don’t remain active for more than a week, indicating the use of an adaptable and dynamic┬áC2 infrastructure, Lumen Black Lotus Labs said in a report shared with The Hacker News. “This botnet has adapted