What's the point of breaking up Emotet?

Fireeye News

Share post

“Emotet has always been one of the most widespread malware families in recent years. What are the long-term benefits of breaking up Emotet? A comment from FireEye.

While it has historically been linked to home banking fraud, the malware has also been used to spread spam and secondary malware since 2017. We believe this was done on behalf of a limited number of groups using Emotet as malware-as-a-service.

Ransomware campaigns with Emotet

Between October 2020 and January 2021, we observed that Emotet was spreading several variants of malware. These were used to enable ransomware campaigns. Thus, it seems plausible that breaking up Emotet could reduce the immediate victims of ransomware attacks in the short term. However, Mandiant has observed in the past how hacking groups rebuild their botnets after other takedown or smashing actions. The likelihood of this scenario depends on the status of the arrested people.

Helpful actors: Trickbot, Qakbot and Silentnight

The actors behind Emotet sometimes cooperate with other well-known malware campaigns, including Trickbot, Qakbot and Silentnight. In addition to the spread of these malware families as secondary malware by Emotet, we have occasionally observed in the past that these malware families also spread Emotet in reverse. These existing partnerships and re-spamming could be used to rebuild the botnet. ”- Kimberly Goody, Senior Manager of Cybercrime Analysis, Mandiant Threat Intelligence at FireEye

More at Barracuda.com

 


About Trellix

Trellix is ​​a global company redefining the future of cybersecurity. The company's open and native Extended Detection and Response (XDR) platform helps organizations facing today's most advanced threats gain confidence that their operations are protected and resilient. Trellix security experts, along with an extensive partner ecosystem, accelerate technology innovation through machine learning and automation to support over 40.000 business and government customers.


 

Matching articles on the topic

New Russian malware Kapeka discovered

The security experts at WithSecure have exposed Kapeka. The new malware appears to have ties to the Russian hacker group Sandworm. Several factors ➡ Read more

Lancom LCOS with root password vulnerability 

Lancom and the BSI report a configuration bug for the LCOS operating system: A vulnerability with the CVSS value of 6.8 can ➡ Read more

XenServer and Citrix Hypervisor vulnerabilities

Citrix warns of two vulnerabilities in XenServer and Citrix Hypervisor. The security vulnerabilities are only moderately serious, but there is still one ➡ Read more

Successful phishing: Attackers attack MFA service providers for Cisco Duo 

Cisco calls its Zero Trust security platform “Duo” for short. Their access is protected by state-of-the-art multi-factor authentication (MFA). Through a ➡ Read more

North Korean state hackers are relying on new espionage tactics

First talk, then hack: The North Korean hacker group TA427 tries to address foreign policy experts in a rather unspectacular way in order to get their point of view ➡ Read more

Disinformation campaigns from China

The report that China is allegedly disrupting and manipulating elections by using AI-generated content to spread disinformation should not be ➡ Read more

OT security status report

A recent survey of industrial companies worldwide – including Germany – paints a worrying picture about the state of OT security ➡ Read more

Holy LG WebOS endangers presentation TVs in companies 

Many companies now have large TV sets in conference rooms for events or video conferences. This unexpectedly also has vulnerabilities behind it ➡ Read more