Emotet, a well-known botnet has begun sending out spam, again. About four months ago, the botnet stopped its campaigns but restarted pumping spam this morning. The emails were written in German, Polish, English and Italian users.
The users are tricked to open an attached document and enable macros, which triggers a PowerShell command to download Emotet from compromised sites, especially those running WordPress.
Malwarebytes warned that once installed “Emotet attempts to spread laterally, in addition to stealing passwords from installed applications. Perhaps the biggest threat, though, is that Emotet serves as a delivery vector for more dangerous payloads, such as ransomware.”
They also added that “Compromised machines can lay in a dormant state until operators decide to hand off the job to other criminal groups that will attempt to extort large sums of money from their victims. In the past, we’ve seen the infamous Ryuk ransomware being deployed that way.”
Ryuk is linked to the North Korean Lazarus Group, is thought to have made almost $3.8m for its operators in six months.
Emotet was originally a banking Trojan that was re-written to function as a malware loader. Its operators sell access to the botnet for clients to use as a malware distribution network.
According to Malwarebytes, Emotet malware was detected and removed over 1.5 million times between January and September 2018 alone. In July last year, US-CERT released an alert about Emotet and its capabilities.
If you are looking for some PDFDrive alternatives, this article lists the top PDF Drive…
If you wish to execute the Epson L120 driver download and update for Windows 11/10,…
In this guide, we will have a look at some of the best game booster…
If you own the Epson L3110 printer and wish to improve its performance, use the…
If you are also facing issues with the Chrome.//net-internals/#DNS on your Google Chrome browser, use…
If you wish to download and update the Logitech Blue Yeti drivers on Windows 10/11…
View Comments