Law enforcement authorities on Tuesday announced the cross-border dismantling of the notorious Qakbot cybercrime operation that hit more than 700,000 computers globally with ransomware and financial fraud attacks.
The takedown, dubbed Operation Duck Hunt, includes the takeover of the Qakbot infrastructure and the distribution of a software utility to automatically uninstall the Qakbot malware from infected machines.
The Qakbot disruption is being hailed as “the largest U.S.-led financial and technical disruption of a botnet” where the FBI was able to gain access to Qakbot infrastructure and identify more than 700,000 computers worldwide, including more than 200,000 in the United States, that appear to have been infected with Qakbot.
“To disrupt the botnet, the FBI was able to redirect Qakbot botnet traffic to and through servers controlled by the FBI, which in turn instructed infected computers in the United States and elsewhere to download a file created by law enforcement that would uninstall the Qakbot malware,” the Justice Department said in a note announcing the takedown.
The Department also announced the seizure of more than $8.6 million in cryptocurrency in illicit profits.
The multinational operation, which involved actions in the United States, France, Germany, the Netherlands, the United Kingdom, Romania, and Latvia, essentially cripples one of the most highly structured and multi-layered botnets used for cybercrime activities.
According to court documents, Qakbot is controlled by an unnamed cybercriminal organization and used to target critical industries worldwide through spam email messages containing malicious attachments or hyperlinks.
Qakbot has been used as an initial means of infection by many prolific ransomware groups that extort victims, seeking ransom payments in bitcoin before returning access to the victim’s computer networks.
“Investigators have found evidence that, between October 2021 and April 2023, Qakbot administrators received fees corresponding to approximately $58 million in ransoms paid by victims,” the Justice Department said.
“The FBI neutralized this far-reaching criminal supply chain, cutting it off at the knees,” said FBI Director Christopher Wray. He noted that Qakbot victims ranged from financial institutions on the East Coast to a critical infrastructure government contractor in the Midwest to a medical device manufacturer on the West Coast.
Related: QBot Infects Over 800 Corporate Users in New Campaign
Related: Qakbot, Emotet Increasingly Targeting Business Users: Microsoft
Related:Latest Online Fraud Report Says Qakbot is No Laughing Matter

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.
More from Ryan Naraine
- Bankrupt IronNet Shuts Down Operations
- AWS Using MadPot Decoy System to Disrupt APTs, Botnets
- Progress Software Patches Critical Pre-Auth Flaws in WS_FTP Server Product
- Chinese Gov Hackers Caught Hiding in Cisco Router Firmware
- CISA Unveils New HBOM Framework to Track Hardware Components
- Gem Security Lands $23 Million Series A Funding
- New ‘Sandman’ APT Group Hitting Telcos With Rare LuaJIT Malware
- CrowdStrike to Acquire Application Intelligence Startup Bionic
Latest News
- Bankrupt IronNet Shuts Down Operations
- AWS Using MadPot Decoy System to Disrupt APTs, Botnets
- Generative AI Startup Nexusflow Raises $10.6 Million
- In Other News: RSA Encryption Attack, Meta AI Privacy, ShinyHunters Hacker Guilty Plea
- Researchers Extract Sounds From Still Images on Smartphone Cameras
- National Security Agency is Starting an Artificial Intelligence Security Center
- CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
- Hackers Set Sights on Apache NiFi Flaw That Exposes Many Organizations to Attacks
