Beware !! Worlds Most Active Malware Emotet Launching New Campaign With Malicious Word and PDF Attachments

Threat actors now launching a new malicious spam campaign since November 5 since then actively spike to target corporate network and individuals.

Emotet banking malware is continually spreading since 2017 and it is one of the costly banking trojans and currently it spreading via large spam campaign.

It has various advance future and persistence techniques along with self-spreading capabilities to harvesting the Email and banking credentials.

Emotet malware activities spike keep increasing Since Nov 5 and the campaign appears to be most active in the Americas, the UK, Turkey, and South Africa.

The new malware campaign emerged again with a new module that capable of exfiltrating email content and send back to the attackers.

The US-Cert team already issued an alert for an advanced Emotet malware attack that targets governments, private and public sectors in the most destructive way to steal various sensitive information.

Emotet Infection Process

New mass spam email campaign that was started since November 5 contain malicious Word and PDF attachments along with unusual body contents.

Also it posed as legitimate payment notification, bank account and other contents that trick users to open the attached malicious word or PDF document.

Mainly Email  email subjects used in the campaign suggest a targeting of English and German-speaking users.

A malicious word document is being used in current Emotet malware and force users to enable the macro and click the link in PDF.

Once the user clicks the link, An Emotet malware dropped and installed into the victim’s system to establish a connection via C&C Server to the attacker.

Later the infected system will receive further instruction to download the secondary level payload.

According to ESET research, The modules extend the initial payload’s functionality with one or more of credential-stealing, network propagation, sensitive information harvesting, port forwarding, and other capabilities. As for the secondary payloads, this campaign has seen Emotet dropping TrickBot and IcedId on compromised machines.

Emotet seems to be continuously spreading very active threat in wide and the attackers are kept updating the new future to maintain the persistence in victims machine.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

CISA Issues Seven ICS Advisories Highlighting Critical Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released seven Industrial Control Systems (ICS) advisories…

18 seconds ago

Pegasus Spyware Now Targeting Business Executives and Financial Sector Professionals

The once-shadowy realm of Pegasus spyware has breached new frontiers, with forensic analyses revealing a…

32 minutes ago

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research and…

14 hours ago

PoC Exploit Released for Ivanti Endpoint Manager Vulnerabilities

A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that could…

14 hours ago

Ransomware Trends 2025 – What’s new

As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and scale.…

15 hours ago

Hackers Delivering Malware Bundled with Fake Job Interview Challenges

ESET researchers have uncovered a series of malicious activities orchestrated by a North Korea-aligned group…

15 hours ago