Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Malware

Emotet Banking Trojan Re-Emerges After Take Down by Law Enforcement

Paul Anderson by Paul Anderson
June 10, 2022
in Malware
0
Emotet Banking Trojan 2022
77
SHARES
1.3k
VIEWS
Share on FacebookShare on Twitter

Botnet Emotet has re-emerged after being taken down by a multinational joint task force operation in January 2021.

You might also like

BlueSky Ransomware Infects KMSAuto Activator users

Syslogk Linux Rootkit triggers with magic packets

BlackCat Ransomware aka “ALPHV” infections on the rise

The developers behind Emotet have been given credit as one of the first organizations to provide Malware-as-a-service (MaaS). Emotet was also known to work with Trickbot, a famous password and information stealing trojan, and the Qakbot banking Trojan.

Emotet Banking Trojan and the pandemic

The banking trojan has been a significant threat throughout the pandemic and created chaos throughout 2019 and 2020 using hot topics to convince its victims to open the malicious emails it spread through.

Many of these malicious email topics included coronavirus data, controversial issues, and political news, as well as updates from the government regarding mask mandates.

This was all put to a halt after a joint task force took the botnet infrastructure down in a global task force operation involving eight countries including the U.S., the Netherlands, and Europol.

Emotet back from the dead

While the threat actors are using many of the same attack methods that they exploited in their past campaigns, Emotet has seen updates that improve its collection and utilization of stolen passwords and account information.

The security researchers at Deep Instinct reported that the stolen credentials are being weaponized to spam and distribute the malware throughout the web.

“The attacks are using hijacked email threads and then using those accounts as a launch point to trick victims into enabling macros of attached malicious office documents,” the researchers added.

Deep instinct’s threat intel team and HP’s Wolf Security have discovered the below key statistics:

  • 9% of threats are unknown, never-before-seen threats
  • 14% of the email malware has bypassed at least one email gateway security scanner before it was captured
  • 45% of the malware detected were utilizing some type of office attachment
  • The most common attachments used to deliver malware were spreadsheets (33%), executables and scripts (29%), archives (22%), and documents (11%)
  • Emotet is now utilizing 64bit shell code, as well as more advanced PowerShell and active scripts
  • Almost 20% of all malicious samples were exploiting a 2017 Microsoft vulnerability (CVE-2017-11882)

These attacks have been seen mainly targeted victims in Japan, with the scope of the attacks expanding to Italy and the United States beginning in March of this year.

For a full in-depth analysis, the Deep instinct team wrote a blog post analyzing and unpacking the malware. The team also introduces a “DeMotet” tool which “was developed to automate the research performed on the malware. The tool is a static unpacker for the latest variant of the Emotet loader. It can extract the encrypted payload from the resource without executing the malware.”. You can download DeMotet from their GitHub here.

Trickbot partners again?

Charles Everette, director of cybersecurity at Deep Instinct has told sources that they believe there’s a continued partnership between the malware developers.

“TrickBot and Emotet have a long history of collaboration,” he said. “As we know, with the rise and fall of the cyber gangs, members often move between organizations. This creates alliances and knowledge-sharing. With Emotet and TrickBot, it’s just one of these alliances that have lasted and weathered several takedown attempts.”

From Everette’s perspective, Emotet is the same as all of the other MaaS botnets that had been taken down but then are resurrected in some way.

“The major difference with Emotet is, you’re still using a good majority of the original code, given more sophisticated techniques, and they seem to be keeping the same name,” Everette said. “Their operations have not changed, because they were highly successful in the past.”

He also mentioned that the threat actors may have moved some of the botnet’s infrastructure out of Europe to South America.

Source: Deep Instinct
Tags: banking trojanMaaSmalwareMalware as a service
Share31Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

BlueSky Ransomware Infects KMSAuto Activator users

by Kyle
July 20, 2022 - Updated on July 22, 2022
0
BlueSky Ransomware backdoors KMSAuto activator

A financially motivated threat actor has been discovered spreading a new ransomware strain, dubbed BlueSky. The group is believed to be connected to the Conti ransomware group. CloudSEK's...

Read more

Syslogk Linux Rootkit triggers with magic packets

by Christi Rogalski
June 19, 2022 - Updated on June 20, 2022
0
Syslogk Linux Rootkit triggers with magic packets

Avast researchers have spotted a Linux rootkit that has the ability to hide malicious processes. The new Linux rootkit, called Syslogk, works by using magic packets to activate...

Read more

BlackCat Ransomware aka “ALPHV” infections on the rise

by Kyle
June 16, 2022 - Updated on July 20, 2022
0
BlackCat Ransomware aka “ALPHV” infections on the rise

As the ransomware-as-a-service (RaaS) industry grows, more ransomware players come into the mix. BlackCat, also known as ALPHV, is a growing ransomware threat with the ability to target...

Read more

State-sponsored Iranian Hackers utilize .NET DNS Backdoor in new Attack

by Kyle
June 12, 2022
0
Lycaeum APT DNS hijacking backdoor

An Advanced Persistent Threat (APT) hacking group based out of Iran going by the name Lycaeum has been seen using a .NET-based DNS backdoor to target organizations within...

Read more

LuoYu Hacker Collective using New Techniques to Deploy WinDealer Backdoor

by Kyle
June 8, 2022
0
LuoYu Windealer advanced persistent threat actor

Researchers at Kaspersky Labs have discovered a new attack by Advanced persistent threat (APT) actor LuoYu utilizing the known malware WinDealer. WinDealer has the unique ability to perform...

Read more
Next Post
WatchDog Targets Docker Containers

WatchDog’s new multi-stage cryptojacking attack unsurfaced

Related News

BlueSky Ransomware backdoors KMSAuto activator

BlueSky Ransomware Infects KMSAuto Activator users

July 20, 2022 - Updated on July 22, 2022
BlackCat Ransomware aka “ALPHV” infections on the rise

BlackCat Ransomware aka “ALPHV” infections on the rise

June 16, 2022 - Updated on July 20, 2022
GIFs in messaging apps are tracking you

GIFs in messaging apps are tracking you

July 19, 2022
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.