New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

Emotet stages a comeback via Trickbot and spam

New York Tech Editorial Team by New York Tech Editorial Team
November 17, 2021
in Cybersecurity
0
Emotet stages a comeback via Trickbot and spam
Share on FacebookShare on Twitter

Emotet is back – a number of researchers have confirmed.

emotet is back

About Emotet

Emotet is a modular banking trojan that also functions as a downloader of other trojans and malware/ransomware.

In January 2021, law enforcement and judicial authorities worldwide moved together to perform a global takedown of the Emotet botnet, and in April 2021 they performed a coordinated, widespread uninstall of the malware from infected machines via a module they propagated in January, effectively crippling the botnet.

Resurrecting the Emotet botnet

According to the researchers, whoever is trying to bring the Emotet botnet back online has started by using the Trickbot botnet to drop the malware, and then added the tried and tested method of sending spam with attachments and links to it.

“These emails were all spoofed replies that used data from stolen email chains, presumably gathered from previously infected Windows hosts,” ISC handler Brad Duncan noted.

Emotet botmasters are counting on users to be tricked into enabling macros so that the malware can be delivered.

“Compared with its previous variants, [Emotet] now contains 3 or 4 more commands that correspond to execution options for downloaded binaries,” shared Felipe Duarte Domingues, security researcher at Appgate.

“It’s not clear if this new version is developed by the same threat actors as before, or if it’s the work of another gang with access to the source code. Takedowns like these against Emotet, TrickBot, and ransomware operations are effective, but it’s very hard to arrest or retire all the involved members. Their remaining threat actors usually rebrand themselves and/or re-use their infrastructures and malware source codes to continue to pursue their objectives. Also, the malware binaries and source codes are still in the wild, so it’s very common for other cybercrime groups to compile their own version adapted to their purposes.”

Luca Ebach, a malware researcher with G Data, says that the new Emotet variants use different encryption to hide data.

Ryan Westman, Manager, Threat Intelligence, eSentire, posited that “this may be a test run or an initial pass to increase their botnet before revealing any new capabilities.”

“Given that threat actors have previously enjoyed leveraging it, [Emotet] could regain its eminence. Another possible reason for its resurfacing could be that it will be used as a honey pot, in a similar way that the REvil servers served as a honey pot when they came back online, and it is an elaborate sting to catch cyber criminals. Again, it is early and hard to weigh in definitively, but those are some initial thoughts,” he added.

But most of the researchers agree that it will take time to grow another botnet the size of the old one.

“Emotet is a known threat, and most of its techniques and capabilities are already studied. Maintaining a botnet is easier than expanding it, as security solutions evolve and get better at detecting the infections,” Duarte Domingues noted.

Mitigation

“The questions IT teams need to be asking have not changed, but the level of risk due to the frequency of threat may see an uptick as this malware family builds up its operations once again. We live in a world where the threat will remain ever present, this event does not change that, but it does highlight the need for continued vigilance and investment in building resilience to cyber threats for all organizations,” says Callum Roxan, head of threat intelligence at F-Secure.

Duarte Domingues advises IT managers and cybersecurity teams to manage this new Emotet version as any other malware threat – by deploying reasonable security measures and training employees against social engineering attacks like e-mails and phishing.

“It’s important to notice that those new capabilities show the actors are focusing on executing other malware along with Emotet. Botnets like Trickbot are often used to spread and move laterally into a network, and even deploy ransomware. Adopting a ZeroTrust model is important for any organization that wants to be protected against Emotet or any other botnet/ransomware threat. By assuming all connections can be compromised and segmenting your network, you can limit the affected systems and the threat actions to a single perimeter and increase the chance of detecting malicious behaviors inside your network.”

Westman says IT managers and cyber security teams need to reviewed their old Emotet detections, grab and check new IOCs/IOAs, and review/block Emotet domains provided by Abuse.ch.


Credit: Source link

Previous Post

The global high-frequency transformer market size is expected to grow from USD 1.7 billion in 2021 to USD 2.3 billion by 2026, at a CAGR of 6.1%

Next Post

Building ‘regulatory sandbox’ would help Ohio join fintech revolution

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
Building ‘regulatory sandbox’ would help Ohio join fintech revolution

Building 'regulatory sandbox' would help Ohio join fintech revolution

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025
The Future of Software Development: Why Low-Code Is Here to Stay

Building Brand Loyalty Starts With Your Team

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Creative Swag Ideas for Hackathons & Launch Parties

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Strengthening Cloud Security With Automation

May 22, 2025
How Local IT Services in Anderson Can Boost Your Business Efficiency

Why VPNs Are a Must for Entrepreneurs in Asia

May 22, 2025

Recommended

Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025
The Future of Software Development: Why Low-Code Is Here to Stay

Building Brand Loyalty Starts With Your Team

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Creative Swag Ideas for Hackathons & Launch Parties

May 23, 2025

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

3D bio-printing acoustic AI Allseated B2B marketing Business carbon footprint climate change coding Collaborations Companies To Watch consumer tech crypto cryptocurrency deforestation drones earphones Entrepreneur Fetcherr Finance Fintech food security Investing Investors investorsummit israelitech Leaders LinkedIn Leaders Metaverse news OurCrowd PR Real Estate reforestation software start- up Startups Startups On Demand startuptech Tech Tech leaders technology UAVs Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media