Emotet Malware Alert Sounded by US Cybersecurity Agency

Emotet Malware Alert Sounded by US Cybersecurity Agency

Anti-Phishing, DMARC , Cybercrime , Cybercrime as-a-service

Must-Have Defenses Include Detecting Infections and Lateral Movement, CISA Says Mathew J. Schwartz (euroinfosec) • January 23, 2020    

The U.S. Cybersecurity and Infrastructure Security Agency on Wednesday warned that it's seen a surge in targeted attacks using a sophisticated strain of malware called Emotet.


See Also: The Application Security Team's Framework For Upgrading Legacy Applications


"Heads up! We're tracking a spike in Emotet and re-upping defensive guidance," Chris Krebs, CISA's director, said on Wednesday.


While Emotet started life as a banking Trojan, over the past five years, developers have added additional functionality, including making the malware a dropper - aka downloader - so that it can be used to install additional malicious code on endpoints it's infected, as well as giving it the ability to scrape victims' PCs for contact information. In addition, other attackers have increasingly rented Emotet botnets to install malware, including Trickbot and various strains of ransomware.


Now, CISA says it's seeing a fresh surge in attacks.


"The Cybersecurity and Infrastructure Security Agency is aware of a recent increase in targeted Emotet malware attacks," its Emotet alert reads.




Support the originator by clicking the read the rest link below.