Monday, November 18, 2024
Homecyber securitySudden Upsurge with Emotet Malware that Designed to Steal Login Credentials

Sudden Upsurge with Emotet Malware that Designed to Steal Login Credentials

Published on

France, Japan, and New Zealand warn of a sudden spike with Emotet malware that steals login credentials from various browsers, email clients, and applications.

The malware was first observed in mid-2014 as a banking Trojan, later it upgrades as an advanced, self-propagating, and modular Trojan. It can be used to install other malware such as Trickbot and QBot onto a system.

Sudden Spike with Emotet

Authorities from France, Japan, and New Zealand observed a sudden spike with the Emotete malware infection targeting several companies and administrations.

- Advertisement - SIEM as a Service

The malware is distributed through malicious email attachments or links to download the documents that appear like genuine invoices, financial documents, shipping information, resumes, scanned documents, or information on COVID-19.

JPCERT/CC observed a rapid increase in the number of domestic domain (.jp) email addresses that are abused and used to distribute the Emotet malware.

The main method of Emotet infection is attachments or emails with links in the body when the attachment gets executed it downloads the file from the link and users are recommended to activate the macro.

The malware steals account credentials, subject, and body data of emails from the infected and can use the stolen data to deliver spam emails.

According to JPCERT, the Emotet spam waves tripled last week and the infection rate is kept on increasing.

The Emotet is one of the most dangerous malware and it is capable of delivering payloads based on the specific tasks. It’s warm like capability helps to spread rapidly with other connected computers.

It is primarily distributed through social engineering techniques such as the emails with the links to download the malware.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Also Read

EmoCrash – Researchers Exploited a Bug in Emotet Malware to Stop its Distribution

New Wave of Emotet Malware Hacks Wi-Fi Networks to Attack New Victims

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Zohocorp ManageEngine ADAudit Plus SQL Injection Vulnerability

Zohocorp, the company behind ManageEngine, has released a security update addressing a critical SQL...

Citrix Virtual Apps & Desktops Zero-Day Vulnerability Exploited in the Wild

A critical new vulnerability has been discovered in Citrix’s Virtual Apps and Desktops solution,...

Sonatype Nexus Repository Manager Hit by RCE & XSS Vulnerability

Sonatype, the company behind the popular Nexus Repository Manager, has issued security advisories addressing...

GeoVision 0-Day Vulnerability Exploited in the Wild

Cybersecurity researchers have detected the active exploitation of a zero-day vulnerability in GeoVision devices,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

China-Nexus Actors Hijack Websites to Deliver Cobalt Strike malware

A Chinese state-sponsored threat group, identified as TAG-112, has been discovered hijacking Tibetan community...