Emotet botnet surges back after months of absence

Emotet botnet surges back after months of absence

After months of inactivity, the infamous Emotet trojan has surged back with a new massive spam campaign targeting users worldwide.


The notorious Emotet went into the dark since February 2020, but now has surged back with a new massive spam campaign targeting users worldwide.


The Emotet banking trojan has been active at least since 2014, the botnet is operated by a threat actor tracked as TA542.


In 2019, security experts haven’t detected any activity associated with Emotet since early April, when researchers at Trend Micro have uncovered a malware campaign distributing a new Emotet Trojan variant that compromises devices and uses them as Proxy C2 servers.


Emotet re-appeared on the threat landscape in August 2019, with an active spam distribution campaign. At the time, Malwarebytes observed the Trojan started pumping out spam, spam messages initially targeted users in Germany, Poland and Italy, and also the US. The campaign continues targeting users in Austria, Switzerland, Spain, the United Kingdom, and the United States.


Emotet is considered by security experts as one of the most active botnet of 2019,


“Today, Emotet suddenly surged back to life with reply-chain, shipping, payment, and invoice spam that deliver malicious Word documents spreadsheets.” states BleepingComputer.




#Emotet ..

Support the originator by clicking the read the rest link below.