Emotet Botnet Returns After Four-Month Hiatus With New Spam Campaign

Emotet Botnet Returns After Four-Month Hiatus With New Spam Campaign
The actors responsible for the Emotet botnet returned after a four-month period of inactivity with a new malspam campaign.On 16 September, SpamHaus security researcher Raashid Bhat spotted a spate of new spam emails written in Polish or German that contained malicious attachments or links to malware downloads.Emotet is fully back in action and spamming. Within the past 15 minutes our researchers have observed activity. #botnet #emotet #ThreatIntel pic.twitter.com/jRTNqph6K0— Spamhaus (@spamhaus) September 16, 2019
These assets, in turn, exposed recipients to Emotet. These samples enlisted victims’ computers into the Emotet botnet, a network of infection devices which digital attackers are increasingly using as a malware-as-a-service (MaaS) to target users with additional malware such as Ryuk. Lake City is all too familiar with this functionality; back in July 2019, the Florida municipality paid digital attackers $460,000 after suffering a “triple threat” ransomware attack in which the Emotet trojan served as a downloader of Trickbot and Ryuk.This new campaign arrived after a period of apparent inactivity for the malware. That’s not to say Emotet wasn’t busy in the beginning of the year. Indeed, Proofpoint observed in its “Q1 2019 Threat Report” that Emotet made ..

Support the originator by clicking the read the rest link below.