Emotet botnet starts blasting malware again after 5 month break

Home/BOTNET, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update, Tips/Emotet botnet starts blasting malware again after 5 month break

Emotet botnet starts blasting malware again after 5 month break

The malicious program operators have been silent for five months and have now again started to spam emails with malicious programs after the vacation. Emotet is the malware typically spread using phishing email campaigns that rely on Word or Excel documents with malicious pieces.

Emotet Botnet

 Emotet was always considered the most distributed and the most active threat of its kind. However, actors stopped these operations for a while on June 13th, 2022. Activities stopped for a while, and the malware got silent. Recent reports showed that Emotet has been spamming users worldwide with malware again.

How the malware started again ?

Researchers stated that new operation campaigns rely on the usage of emails stolen from email reply chains. This way, Emotet can distribute malicious Excel attachments to further infect machines with malware. These campaigns target various users in the world under different languages and file names with email attachments that pose as invoices, scans, and electronic forms, using other luring methods.

Emotet Excel attachments instruct users to copy the file into trusted folders named templates, and doing so bypasses the Protected View. It works with files containing a Microsoft Office Mark-of-the-Web flag.

The system should show a warning about copying to the Templates folder, but users most likely ignore that and click the Continue button, which ensures the procedure.

As Emotet and other malwares increasing day by day organizations, as well as users, need to improve their malware security solutions.

Few samples were uploaded to virustotal.

Emotet URLs detected

hxxp://mchat[.]medianewsonline[.]com/headers/onE6NirmxFsYoU3FHR/

hxxps://akuntansi[.]itny[.]ac[.]id/asset/9aVFvYeaSKOhGBSLx/ hxxp://updailymail[.]com/cgi-bin/gBYmfqRi2utIS2n/

hxxp://www[.]nipunpharmaskill[.]com/fonts/CgI1tduJfA/ hxxp://45[.]127[.]102[.]193/images/rbwMLaaD9HkvFU4Px/

hxxp://158[.]199[.]168[.]181/i-bmail/ecbxbEwwy/

hxxp://a[.]angel-tn[.]idv[.]tw/web_images/r4psvIE1r6WJT/

Follow Us on: Twitter, InstagramFacebook to get the latest security news!

By | 2022-11-03T18:33:55+05:30 November 3rd, 2022|BOTNET, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update, Tips|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!