Emotet malware has back to action after a four-month hiatus that allowed cybersecurity experts to worry about other things.
In what sounds like the log line for a bad movie, Emotet is back. The most active malware threat of 2018 and 2019, Emotet went silent early in 2020. On July 17, though, it again reared its head in campaigns using URLs or attachments in email messages to launch PowerShell scripts that download Emotet's active components.
Those components then lie in wait until instructed by a command-and-control server to begin their malicious work -- tending to involve downloading and installing more active malware onto a victim's computer.
In the past year, that active malware has often been a form of ransomware, though Emotet networks are typically leased out to install the malware chosen by the criminal customer.
Read more here.
About the Author(s)
You May Also Like
Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them
April 4, 2024Cybersecurity Strategies for Small and Med Sized Businesses
April 11, 2024Defending Against Today's Threat Landscape with MDR
April 18, 2024Securing Code in the Age of AI
April 24, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024Black Hat Asia - April 16-19 - Learn More
April 16, 2024