[German]The Microsoft Security Intelligence team has just posted an alert on Twitter warning of a massive Emotet campaign that broke out a few hours ago.
The Trojan Emotet reappeared yesterday (after a break of several months) in a massive campaign.
Emotet resurfaced in a massive campaign today after being quiet for several months. The new campaign sports longtime Emotet tactics: emails carrying links or documents w/ highly obfuscated malicious macros that run a PowerShell script to download the payload from 5 download links pic.twitter.com/FZJqDCJQGV
— Microsoft Security Intelligence (@MsftSecIntel) July 17, 2020
The new campaign is based on long-standing emote tactics: emails with links or documents with heavily obfuscated malicious macros that execute a PowerShell script to download the payloads of 5 download links. The colleagues from Bleeping Computer have collected more information here.
Cookies helps to fund this blog: Cookie settings