DarkGate Malware Seen in 14,000+ Campaigns After FBI Thwarts Rival QBot 

Published on July 16, 2024
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer
Edited by:
Novak Bozovic
Novak Bozovic
Tech & VPN Content Specialist

A threat actor tracked as 'TA571' is using DarkGate to gain access to 1,000+ organizations worldwide in an attack spanning 14,000 campaigns and containing 1,300+ different malware variants, as a recent Proofpoint report says. This surge in DarkGate use was also observed by Palo Alto Networks Unit 42 security analysts.

DarkGate was relatively under the radar until 2021, but Unit 42 security researchers say they saw a surge in DarkGate starting in September 2023, right after the FBI took down its botnet and malware loader rival’s infrastructure, QBot (aka Qakbot), one month before.

The recent DarkGate campaigns use AutoIt or AutoHotkey scripts for infection, targeting victims across the U.S., Europe, and significant portions of Asia, and a sixth major version was released in January 2024, identified as version 6.1.6 by Spamhaus.

From March to April 2024, Palo Alto Networks saw a campaign that employed servers running open Samba file shares hosting files for DarkGate infections, with a peak of almost 2,000 samples in one of the days.

DarkGate Recurrence
Image Credits: Palo Alto Networks

The sophisticated DarkGate malware campaign targets Windows machines supported by a reactive Command and Control system and has evolved into a malware-as-a-service (MaaS). It spreads through malicious torrent files, social engineering, phishing emails, compromised websites, and DLL sideloading.

DarkGate malware uses advanced evasion techniques, like code obfuscation, encryption, and anti-debugging measures, and executes multiple payloads, including data exfiltration, cryptocurrency mining, crypto stealing, ransomware, keylogging, credential theft, and remote access. 



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: