Monday, February 10, 2025
HomeMalwareBanking Trojan Called "EMOTET" Re-emerging to Steal Username And Password

Banking Trojan Called “EMOTET” Re-emerging to Steal Username And Password

Published on

SIEM as a Service

Follow Us on Google News

A Banking Trojan called “EMOTET” Re-emerging again with New Capabilities that stealing personal information such as username and Password via Network Sniffing method.

Initially, EMOTET Discovered on 2014 when it has similar futures often rely on form field insertion or phishing pages to steal information.

There is 2 main Reason for re-emerging this EMOTET Malware Even the Malicious activities are more similar when compared to earlier Variant.

First one is, it’s not choosing the Specific industries to attack instead of that, it affected companies come from different industries, including manufacturing, food and beverage, and healthcare.

The second one is, it choosing Different Method to spread the variant, for example, Spam Email Campaign and network propagation module that brute forces its way into an account domain using a dictionary attack.

The United States, United Kingdom, and Canada made up the bulk of the target regions, with the US taking up 58% of all our detected infections, while Great Britain and Canada were at 12% and 8% respectively.

Also Read:  Beware !! Dangerous RAT’s Called “Adwind, Remcos, Netwire” Delivering via A360 Cloud Drive

How Does EMOTET Stealing the Personal Information

Spam Email Campaign is one of the larger and more effective Method to Spreading the Malware and a higher chance of gaining information.

Initially, EMOTET Malware sending via Malicious Spam Email that indicated as an Invoice payment or Payment Notification which contains Malicious URL.

Once we Click the URL, it leads to Download a Doc file that containing the Malicious Macro file.

Banking Trojan

Later Macro Execute the Powershell command that is Responsible to Download the EMOTET Malware.

According to Trend Micro Report, once downloaded, EMOTET drops and executes copies of itself into the following folders:

  • If EMOTET has no admin privileges, it will drop the copies into %AppDataLocal%\Microsoft\Windows\{string 1}{string 2}.exe
  • If EMOTET contains admin privileges, it will instead drop the copies into System%\{string 1}{string 2}.exe

EMOTET add into Every Registry Entry to Make sure the automatic startup for the Every Execution.

Once Its Started, its will gathering the information such as OS, running Process, Personal Information.

At long last, it will Contact to Command and control server to Share the Collected data that was assembled from a contaminated PC.

From our recent samples of EMOTET malware, we have observed that it has become a Loader Trojan that decrypts and loads any binary coming from its Command & Control (C&C) server. Trend Micro said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Tor Browser 14.0.6 Released, What’s New!

The Tor Project has officially unveiled Tor Browser 14.0.6, now accessible for download from the...

Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released

A newly discovered vulnerability in AnyDesk, the popular remote desktop software, has sparked serious...

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Hackers Leveraging Image & Video Attachments to Deliver Malware

Cybercriminals are increasingly exploiting image and video files to deliver malware, leveraging advanced techniques...

Hackers Exploiting SimpleHelp Vulnerabilities to Deploy Malware on Systems

Cybercriminals are actively exploiting vulnerabilities in SimpleHelp Remote Monitoring and Management (RMM) software to...