Categories: Malware

Banking Trojan Called “EMOTET” Re-emerging to Steal Username And Password

A Banking Trojan called “EMOTET” Re-emerging again with New Capabilities that stealing personal information such as username and Password via Network Sniffing method.

Initially, EMOTET Discovered on 2014 when it has similar futures often rely on form field insertion or phishing pages to steal information.

There is 2 main Reason for re-emerging this EMOTET Malware Even the Malicious activities are more similar when compared to earlier Variant.

First one is, it’s not choosing the Specific industries to attack instead of that, it affected companies come from different industries, including manufacturing, food and beverage, and healthcare.

The second one is, it choosing Different Method to spread the variant, for example, Spam Email Campaign and network propagation module that brute forces its way into an account domain using a dictionary attack.

The United States, United Kingdom, and Canada made up the bulk of the target regions, with the US taking up 58% of all our detected infections, while Great Britain and Canada were at 12% and 8% respectively.

Also Read:  Beware !! Dangerous RAT’s Called “Adwind, Remcos, Netwire” Delivering via A360 Cloud Drive

How Does EMOTET Stealing the Personal Information

Spam Email Campaign is one of the larger and more effective Method to Spreading the Malware and a higher chance of gaining information.

Initially, EMOTET Malware sending via Malicious Spam Email that indicated as an Invoice payment or Payment Notification which contains Malicious URL.

Once we Click the URL, it leads to Download a Doc file that containing the Malicious Macro file.

Later Macro Execute the Powershell command that is Responsible to Download the EMOTET Malware.

According to Trend Micro Report, once downloaded, EMOTET drops and executes copies of itself into the following folders:

  • If EMOTET has no admin privileges, it will drop the copies into %AppDataLocal%\Microsoft\Windows\{string 1}{string 2}.exe
  • If EMOTET contains admin privileges, it will instead drop the copies into System%\{string 1}{string 2}.exe

EMOTET add into Every Registry Entry to Make sure the automatic startup for the Every Execution.

Once Its Started, its will gathering the information such as OS, running Process, Personal Information.

At long last, it will Contact to Command and control server to Share the Collected data that was assembled from a contaminated PC.

From our recent samples of EMOTET malware, we have observed that it has become a Loader Trojan that decrypts and loads any binary coming from its Command & Control (C&C) server. Trend Micro said.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Google’s SafetyCore App Secretly Scans All Photos on Android Devices

Recent revelations about Google’s SafetyCore app have ignited a firestorm of privacy debates, echoing Apple’s…

52 minutes ago

New “nRootTag” Attack Turns 1.5 Billion iPhones into Free Tracking Tools

Security researchers have uncovered a novel Bluetooth tracking vulnerability in Apple’s Find My network –…

2 hours ago

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the arrest…

3 hours ago

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection vulnerability…

6 hours ago

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from networks…

6 hours ago

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform that…

8 hours ago