← Back to SOC feed Coverage →

Qakbot Craigslist Domains

kql MEDIUM Azure-Sentinel
DeviceNetworkEvents
backdoorhuntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-05T23:00:00Z · Confidence: medium

Hunt Hypothesis

Qakbot adversaries are using Craigslist domains to host malicious links in phishing emails, attempting to deceive users into interacting with compromised infrastructure. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate Qakbot campaign activity before it leads to credential theft or lateral movement.

KQL Query

DeviceNetworkEvents
| where RemoteUrl matches regex @"abuse\.[a-zA-Z]\d{2}-craigslist\.org"

Analytic Rule Definition

id: 44b525e1-a1dd-483c-9f45-e5e4a9ccf5ee
name: Qakbot Craigslist Domains
description: |
  Qakbot operators have been abusing the Craigslist messaging system to send malicious emails. These emails contain non-clickable links to malicious domains impersonating Craigslist, which the user is instructed to manually type into the address bar to access.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceNetworkEvents
tactics:
- Initial access
query: |
  DeviceNetworkEvents
  | where RemoteUrl matches regex @"abuse\.[a-zA-Z]\d{2}-craigslist\.org"

Required Data Sources

Sentinel TableNotes
DeviceNetworkEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Campaigns/Qakbot/Qakbot Craigslist Domains.yaml