Beware !! Worlds Most Active Malware Emotet Launching New Campaign With Malicious Word and PDF Attachments

Threat actors now launching a new malicious spam campaign since November 5 since then actively spike to target corporate network and individuals.

Emotet banking malware is continually spreading since 2017 and it is one of the costly banking trojans and currently it spreading via large spam campaign.

It has various advance future and persistence techniques along with self-spreading capabilities to harvesting the Email and banking credentials.

Emotet malware activities spike keep increasing Since Nov 5 and the campaign appears to be most active in the Americas, the UK, Turkey, and South Africa.

The new malware campaign emerged again with a new module that capable of exfiltrating email content and send back to the attackers.

The US-Cert team already issued an alert for an advanced Emotet malware attack that targets governments, private and public sectors in the most destructive way to steal various sensitive information.

Emotet Infection Process

New mass spam email campaign that was started since November 5 contain malicious Word and PDF attachments along with unusual body contents.

Also it posed as legitimate payment notification, bank account and other contents that trick users to open the attached malicious word or PDF document.

Mainly Email  email subjects used in the campaign suggest a targeting of English and German-speaking users.

A malicious word document is being used in current Emotet malware and force users to enable the macro and click the link in PDF.

Once the user clicks the link, An Emotet malware dropped and installed into the victim’s system to establish a connection via C&C Server to the attacker.

Later the infected system will receive further instruction to download the secondary level payload.

According to ESET research, The modules extend the initial payload’s functionality with one or more of credential-stealing, network propagation, sensitive information harvesting, port forwarding, and other capabilities. As for the secondary payloads, this campaign has seen Emotet dropping TrickBot and IcedId on compromised machines.

Emotet seems to be continuously spreading very active threat in wide and the attackers are kept updating the new future to maintain the persistence in victims machine.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch"…

1 day ago

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by Egypt-based…

2 days ago

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in Central…

2 days ago

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to India,…

2 days ago

Raspberry Robin Employs TOR Network For C2 Servers Communication

Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade detection…

2 days ago

145,000 ICS Systems, Thousands of HMIs Exposed to Cyber Attacks

Critical infrastructure, the lifeblood of modern society, is under increasing threat as a new report…

2 days ago