Emotet Lives!Emotet Lives!
Emotet malware has back to action after a four-month hiatus that allowed cybersecurity experts to worry about other things.
July 18, 2020
In what sounds like the log line for a bad movie, Emotet is back. The most active malware threat of 2018 and 2019, Emotet went silent early in 2020. On July 17, though, it again reared its head in campaigns using URLs or attachments in email messages to launch PowerShell scripts that download Emotet's active components.
Those components then lie in wait until instructed by a command-and-control server to begin their malicious work -- tending to involve downloading and installing more active malware onto a victim's computer.
In the past year, that active malware has often been a form of ransomware, though Emotet networks are typically leased out to install the malware chosen by the criminal customer.
Read more here.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks