Emotet Malware Rears Its Ugly Head Again

A resurgence in Emotet malware may make it one of the most pervasive security threats of 2020.

Dark Reading Staff, Dark Reading

February 21, 2020

1 Min Read

When it comes to IT security, there is a natural tendency to focus on next-generation threats. But while awareness of newly discovered threats and vulnerabilities is essential, it is also important not to lose sight of long-established threats. Such is the case with Emotet malware.

As malware goes, Emotet has a surprisingly long history. Emotet malware first gained traction in 2014 as a Trojan that was designed to steal online banking information. Over time, Emotet evolved both in the way that it is delivered and in how it behaves.

Today, Emotet malware infections are primarily spread through malicious email messages propagated by botnets. These emails may claim to contain a payment invoice, a receipt for a recently purchased product, a shipping update or practically anything else that might entice an unsuspecting victim into opening an infected attachment. Upon infecting a device, Emotet malware typically downloads and installs additional malware. It is also commonly used to infect computers with ransomware.


At one time, it seemed as though Emotet was about to go extinct. However, Emotet has recently seen a resurgence--one big enough that it is reasonable to expect that Emotet will be one of the most pervasive security threats of 2020.


Read the full article on ITPro Today here.


About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights