Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective

Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective
In recent weeks, Emotet has emerged as the most common form of ransomware. Managing the risk involves starts with understanding the way it works.

Ransomware has emerged as a primary threat to organizations of all shapes and sizes. According to "The State of Ransomware 2020" report by cybersecurity firm Sophos, 51% of organizations have been hit by ransomware attacks within the past year, and the average cost to remediate an attack has reached $761,106 globally.


While numerous types of ransomware exist, one of the more prominent and dangerous versions is Emotet. Emotet is a "key component" in ransomware campaigns, noted security firm Mimecast in its 2020 "Threat Intelligence Report." And, per Proofpoint, the most common countries targeted include Germany, Austria, Switzerland, the United States, the United Kingdom, and Canada.


What Is Emotet?Emotet is a Trojan available through a malware-as-a-service (MaaS) model. This means cybercriminals can download a package, often for a few hundred dollars or a monthly subscription fee, and direct attacks to businesses and individuals.


The initial payload — which is typically delivered via e-mail, infected documents, or websites — unleashes a script, macro, or code that operates as a worm that infects various software applications and systems, such as an Outlook address book or a cl ..

Support the originator by clicking the read the rest link below.