Threat actors now launching a new malicious spam campaign since November 5 since then actively spike to target corporate network and individuals.
Emotet banking malware is continually spreading since 2017 and it is one of the costly banking trojans and currently it spreading via large spam campaign.
It has various advance future and persistence techniques along with self-spreading capabilities to harvesting the Email and banking credentials.
Emotet malware activities spike keep increasing Since Nov 5 and the campaign appears to be most active in the Americas, the UK, Turkey, and South Africa.
The new malware campaign emerged again with a new module that capable of exfiltrating email content and send back to the attackers.
The US-Cert team already issued an alert for an advanced Emotet malware attack that targets governments, private and public sectors in the most destructive way to steal various sensitive information.
New mass spam email campaign that was started since November 5 contain malicious Word and PDF attachments along with unusual body contents.
Also it posed as legitimate payment notification, bank account and other contents that trick users to open the attached malicious word or PDF document.
Mainly Email email subjects used in the campaign suggest a targeting of English and German-speaking users.
A malicious word document is being used in current Emotet malware and force users to enable the macro and click the link in PDF.
Once the user clicks the link, An Emotet malware dropped and installed into the victim’s system to establish a connection via C&C Server to the attacker.
Later the infected system will receive further instruction to download the secondary level payload.
According to ESET research, The modules extend the initial payload’s functionality with one or more of credential-stealing, network propagation, sensitive information harvesting, port forwarding, and other capabilities. As for the secondary payloads, this campaign has seen Emotet dropping TrickBot and IcedId on compromised machines.
Emotet seems to be continuously spreading very active threat in wide and the attackers are kept updating the new future to maintain the persistence in victims machine.
Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch"…
Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by Egypt-based…
The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in Central…
Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to India,…
Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade detection…
Critical infrastructure, the lifeblood of modern society, is under increasing threat as a new report…