{"id":22151,"date":"2021-11-16T07:42:09","date_gmt":"2021-11-16T06:42:09","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=22151"},"modified":"2021-11-16T07:42:09","modified_gmt":"2021-11-16T06:42:09","slug":"emotet-malware-is-back","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/11\/16\/emotet-malware-is-back\/","title":{"rendered":"Emotet malware is back"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" width=\"200\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/11\/16\/emotet-malware-ist-zurck\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]The Emotet malware (Trojan and ransomware) was quite successful and infected numerous systems. Law enforcers had managed to hack the botnet's infrastructure for distributing the malware. As of April 25, 2021, Emotet malware was automatically removed from Windows machines. However, it was not permanent, because the Emotet malware is back and building a new botnet.<\/p>\n<p><!--more--><\/p>\n<h2>The Emotet malware<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg08.met.vgwort.de\/na\/e7ed52b3c6af4a159750c8b09940dbba\" width=\"1\" height=\"1\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/Emotet\" target=\"_blank\" rel=\"noopener\">Emotet<\/a> was originally a banking Trojan that was first identified by Trend Micro in June 2014. In the meantime, a complete cyber group stands behind this malware and continues to develop it. In the summer of 2019, the group even afforded itself the 'luxury' of shutting down its infrastructure to take a holiday (see <a href=\"https:\/\/borncity.com\/win\/2019\/08\/23\/cert-bund-warns-emotet-is-back-cc-server-online-again\/\">CERT-Bund warns: Emotet is back, C&amp;C servers online again<\/a>).  <\/p>\n<p>The Emotet group has been responsible for numerous successful ransomware attacks on companies, authorities and institutions worldwide. Emotet was considered to be the most dangerous malware worldwide at the moment and infected a high number of IT systems of companies, authorities and institutions, in addition to computers of hundreds of thousands of private individuals. A search here in the blog will reveal a number of hits on emotet infections. <\/p>\n<p>As a so-called \"downloader\", Emotet had the function of infecting a victim system unnoticed and reloading further malware, for example to manipulate online banking, to spy out stored passwords or to encrypt the system for blackmail. The use of this \"botnet\" created by the perpetrators, together with the reloading of any malware, was offered for a fee in the \"underground economy\". Therefore, Emotet's criminal business model can be called \"malware-as-a-service.\" I have discussed the malware extensively in the articles linked at the end of the post.&nbsp; <\/p>\n<p>On January 2021, law enforcers were able to take over the Emotet Command &amp; Control (C&amp;C) servers and modify the malware reloading function via the C&amp;C servers, install their own modules on the infected victim systems, and disable the malware functions at the same time. From then on, the victim systems could only communicate with the controlled C&amp;C servers. On April 25, 2021, the infrastructure was shut down and the malware on infected systems was removed (see <a href=\"https:\/\/borncity.com\/win\/2021\/04\/26\/malware-wird-automatisch-am-25-april-2021-deinstalliert\/\">Emotet Malware has been automatically uninstalled on April 25, 2021<\/a>).<\/p>\n<h2>Emotet is back<\/h2>\n<p>Now Cryptolaemus (see <a href=\"https:\/\/borncity.com\/win\/2020\/03\/02\/cryptolaemus-and-the-fight-against-emotet\/\">Cryptolaemus and the fight against Emotet<\/a>) reports on <a href=\"https:\/\/twitter.com\/Cryptolaemus1\/status\/1460403592658145283\" target=\"_blank\" rel=\"noopener\">Twitter<\/a>,&nbsp; that the malware is back. The group observed that bots are starting to spam via the so-called Epoch 4 botnet to spread the malware. So far, only attachment-based malspam with .docm or .xlsm files (actually XLSM with an AF template \"<a href=\"https:\/\/twitter.com\/Cryptolaemus1\/status\/1460403600916725760\" target=\"_blank\" rel=\"noopener\">Excell<\/a>\") or password-protected ZIPs (Operation ZipLock) has been observed.<\/p>\n<p><a href=\"https:\/\/twitter.com\/Cryptolaemus1\/status\/1460403592658145283\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Emotet back\" alt=\"Emotet back\" src=\"https:\/\/i.imgur.com\/ZtKKWsN.png\"><\/a><\/p>\n<p>The Cryptolaemus group shares examples on various platforms according to this <a href=\"https:\/\/twitter.com\/Cryptolaemus1\/status\/1460424394820489218\" target=\"_blank\" rel=\"noopener\">tweet<\/a>.&nbsp; Colleagues at Bleeping Computer picked up on the whole thing in the following tweet and summarized it in <a href=\"https:\/\/t.co\/2ncDLgog7N?amp=1\" target=\"_blank\" rel=\"noopener\">this article<\/a>.<\/p>\n<p><a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1460337957123022853\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"EMOTET Malware\" alt=\"EMOTET Malware\" src=\"https:\/\/i.imgur.com\/fZdGw5L.png\"><\/a><\/p>\n<p>Security researchers from <a href=\"https:\/\/twitter.com\/Cryptolaemus1\/status\/1460302706954981385\" target=\"_blank\" rel=\"noopener\">Cryptolaemus<\/a>, <a href=\"https:\/\/cyber.wtf\/2021\/11\/15\/guess-whos-back\/\" target=\"_blank\" rel=\"noopener\">GData<\/a>, and <a href=\"https:\/\/twitter.com\/VK_Intel\/status\/1460308855129313281\" target=\"_blank\" rel=\"noopener\">Advanced Intel<\/a> are currently observing that the TrickBot malware drops a loader for Emotet on infected devices. However, Emotet expert and Cryptolaemus researcher Joseph Roosen told BleepingComputer that there is no evidence that the Emotet botnet is spamming, and no malicious documents have been found spreading the malware.<\/p>\n<p>Bleeping Computer suspects that the lack of spamming activity is likely due to the fact that the Emotet infrastructure is being rebuilt from scratch. At the same time, new response chain emails could be stolen from victims in future spam campaigns. The Record has also published <a href=\"https:\/\/therecord.media\/emotet-botnet-returns-after-law-enforcement-mass-uninstall-operation\/\" target=\"_blank\" rel=\"noopener\">an arti<\/a>cle with details.<\/p>\n<p><strong>Similar articles:<br \/><\/strong><a href=\"https:\/\/borncity.com\/win\/2020\/08\/17\/emocrash-impfschutz-vor-emotet-infektionen\/\">EmoCrash protectet systems for 6 months against emotet-infections<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/02\/cryptolaemus-and-the-fight-against-emotet\/\">Cryptolaemus and the fight against Emotet<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/07\/18\/microsoft-warnt-vor-massiver-emotet-kampagne\/\">Microsoft warns of massive Emotet campaign<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/08\/17\/emocrash-impfschutz-vor-emotet-infektionen\/\">EmoCrash protectet systems for 6 months against emotet-infections<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/11\/warning-about-a-new-emotet-ransomeware-campaign-sept-2020\/\">Warning about a new Emotet-Ransomeware campaign (Sept. 2020)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/07\/18\/microsoft-warnt-vor-massiver-emotet-kampagne\/\">Microsoft warns of massive Emotet campaign<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/04\/05\/emotet-kann-computer-im-netzwerk-berhitzen\/\">Emotet Trojan can overload computers on the network<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2019\/09\/11\/emotet-cc-server-liefern-neue-schadsoftware-aus\/\">Emotet C&amp;C servers deliver new malware<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2019\/12\/07\/faq-reagieren-auf-eine-emotet-infektion\/\">FAQ: Responding to an Emotet infection<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/11\/warning-about-a-new-emotet-ransomeware-campaign-sept-2020\/\">Warning about a new Emotet-Ransomeware campaign (Sept. 2020)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/11\/01\/emotet-malware-als-vermeintliches-word-update-getarnt\/\">Emotet malware comes as a supposed Word update<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/22\/neu-emotet-kampagne-zu-weihnachten-2020\/\">New Emotet Campaign during the Holidays 2020<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/01\/27\/bka-infrastruktur-der-emotet-schadsoftware-bernommen-und-zerschlagen\/\">German BKA initiate a takedown of Emotet malware infrastructure<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/01\/28\/emotet-reportedly-uninstalls-itself-on-march-25-2021\/\">Emotet reportedly uninstalls itself on April 25, 2021<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/01\/30\/details-zur-emotet-deinstallation-durch-strafverfolger\/\">Details of Emotet uninstallation by law enforcement officials<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/04\/26\/malware-wird-automatisch-am-25-april-2021-deinstalliert\/\">Emotet Malware has been automatically uninstalled on April 25, 2021<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/05\/01\/prfung-wurde-meine-e-mail-adresse-durch-die-schadsoftware-emotet-erbeutet\/\">Check: Has my email address been hijacked by the Emotet malware?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]The Emotet malware (Trojan and ransomware) was quite successful and infected numerous systems. Law enforcers had managed to hack the botnet's infrastructure for distributing the malware. As of April 25, 2021, Emotet malware was automatically removed from Windows machines. However, &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/11\/16\/emotet-malware-is-back\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-22151","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/22151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=22151"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/22151\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=22151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=22151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=22151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}