Breaking

Emotet Malware is reborn and spreading via TrickBot infrastructure

The popular Emotet malware that was extensive spread in the past is back again. The malware used malicious campaigns and fake emails to spread across the web. The infected machines are then used for further spreading, and then deploy multiple payloads as per the mission. Payloads like Trickbot, QakBot, Ryuk, Conti, Egregor, ProLock ransomware were distributed using Emotet malware.

In the beginning of 2021, Europol along with the international law enforcement shutdown the Emotet malware and its entire structure, arresting two hackers. The malware was countered when the German law enforcement deployed a counter Emotet module to remove the Emotet malware from the infected devices on April 2021.

Emotet Malware is back

Security researchers from Cryptolaemus, Advanced Intel and GData have identified the Emotet stains that is being dropped by TricBot malware. Hackers have used the method called ‘Operation Reacharound’ to use the existing TrickBot malware infrastructure to bring back Emotet online, which pretty much seems like a move straight from a marvel movie. Although it seems the Emotet malware is still inoperative and dormant now, and not dropping any payloads.

The researchers have mentioned there are changes in the binaries and the command buffer, which implies the Emotet is preparing itself to be used for mass launches in the future, especially more ransomware attacks.

Building your defenses against the new Emotet

Malware experts from Abuse.ch have disclosed a list of C&C servers that Emotet uses and advised network admins to block those IP addresses immediately. It should be noted there are already 246 devices that has been infected by the new.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on FacebookLinkedinInstagramTwitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

1 day ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago