Renewed Emotet phishing activity targets UN, government & military users

Renewed Emotet phishing activity targets UN, government & military users

Since resuming operations after a holiday hiatus, the malicious actors behind the Emotet banking trojan network have reportedly targeted at least 82 countries with spam and crafted a special phishing campaign targeting the United Nations.


Meanwhile, an additional report has revealed an increase in Emotet phishing activity targeting government and military entities over the last few months of 2019, with signs of this trend continuing into the new year.


Citing researcher Joseph Roosen, and email security firm Cofense, BleepingComputer reported earlier this week that the Emotet network launched a major spam assault on Jan. 13, with a strong focus on the U.S., after a three-week break in activity.


Reportedly, many of the phishing emails purported to contain business-related Microsoft Word attachments such as proof-of-delivery documents and agreements. Users who opened these attachments and enabled the malicious macros embedded within were subsequently infected with Emotet.


A particularly targeted Emotet phishing mail was sent to 600 United Nations email a ..

Support the originator by clicking the read the rest link below.