26 Dhu al-Qi'dah 1443 - 25 June 2022
    
  • Twitter Facebook Instagram Icon Linkedin Youtube Snapchat
Sign up for newsletter
Eye of Riyadh
Healthcare | Thursday 14 April, 2022 9:39 pm |
Share:

The notorious botnet is back: Emotet’s activity grows three-fold in just one month


Emotet, a botnet and, according to Europol, “the most dangerous malware in the world”  showed worldwide growth of over 200% in March 2022, according to Kaspersky telemetry. This growth indicates that the threat actors behind the botnet have been taking steps to significantly increase their malicious activity for the first time since its comeback in November 2021. These findings are part of the latest Kaspersky research that dissects Emotet’s modules and recent activity.

 

Emotet is both a botnet, a controlled network of infected devices used for attacks on other devices and malware that is capable of extracting different kinds of data, often pertaining to finance, from infected devices. Operated by experienced threat actors, it has become one of the biggest players in the cybercrime world. Emotet was shut down following a joint effort from various law enforcement agencies from different countries back in January 2021. However, in November 2021, the botnet returned and has been gradually increasing its activity since. Firstly by spreading via Trickbot, a different bot network, and now by itself via the means of malicious spam campaigns.

 

Kaspersky telemetry shows that the number of victims shot up from 2,843 in February 2022 to 9,086 in March, attacking over three times the number of users. The number of attacks detected by Kaspersky solutions has grown accordingly – from 16,897 in February 2022 to 48,597 in March. 

 

 

 

A typical Emotet infection begins with spam e-mails that contain Microsoft Office attachments with a malicious macro. Using this macro, the actor can start a malicious PowerShell command to drop and start a module loader, which can then communicate with a command and control sever to download and start modules. These modules can perform a variety of different tasks on the infected device. Kaspersky researchers were able to retrieve and analyze 10 out of 16 modules, with most having been used by Emotet in the past in one form or another.

 

The current version of Emotet can create automated spam campaigns that are further spread down the network from the infected devices, extracting emails and email addresses from Thunderbird and Outlook applications and collecting passwords from popular web browsers, such as Internet Explorer, Mozilla Firefox, Google Chrome, Safari and Opera, to gather the account details of various email clients.

 

“Emotet was a highly advanced network that haunted many organizations around the world. Its takedown was a significant step towards decreasing threats worldwide by helping to tear apart their network and removing it from the top threat list for over a year. While the number of attacks is not comparable to the previous scale of Emotet’s operations, the change in dynamics points to a significant activation of the botnet’s operators and a high likelihood of this threat spreading further in the coming months,’ comments Alexey Shulmin, security researcher at Kaspersky.

 

Watch the documentary about Emotet’s takedown on Tomorrow Unlocked.

 

Learn more about Emotet modules on Securelist.com.

 

To help businesses stay protected from Emotet and similar botnets, experts suggest organizations take the following measures as soon as possible:

 

  • Keep up to date. Check for further developments regarding Emotet. There are several ways to do this, such as visiting the Kaspersky Resource Center or conducting your own research.
  • Do not download dubious attachments from spam emails or click on suspicious links. If you're unsure whether an email is fake, avoid risks and contact the sender. If you are asked to allow a macro to run on a downloaded file, do not do so under any circumstances and delete the file immediately. This way you will not give Emotet a chance to get on your computer.
  • Use online banking with multifactor authentication solutions.
  • Be sure to install a full virus and malware protection program, such as Kaspersky Internet Security, and have it scan your computer regularly for any vulnerabilities. This will give you the best possible protection against the latest viruses, spyware etc.
  • Make sure your software is updated – including your operating system and any software applications, (attackers exploit loopholes in widely used programs to gain entry). 
  • Invest in regular cybersecurity awareness training for employees to educate them on best practices, such as not clicking on links or opening attachments received from untrusted sources. Follow this up with a simulated phishing attack to ensure they know how to distinguish phishing emails.
Share:
Print
Post Your Comment (View 1 Comments)
wels24 . c o m Friday 15 April, 2022 11:33 am
14 days war finished at 9 march 2022. There are no excuses.
ADD TO EYE OF Riyadh
RELATED NEWS
MOST POPULAR