Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Emotet botnet takedown – what you need to know
  • Data Breach
  • Malware
  • Vulnerabilities

Emotet botnet takedown – what you need to know

5 years ago Graham Cluley
Emotet botnet takedown – what you need to know

What’s happened?

Law enforcement agencies across the globe say that they have dealt a blow against Emotet, described by Interpol as “the world’s most dangerous malware”, by taking control of its infrastructure.

Police have dubbed their action against Emotet “Operation LadyBird.”

What is Emotet?

Emotet is an extremely advanced and pernicious family of rapidly-spreading malware, with the capability of dropping other malware onto users’ computers.

Emotet first caused problems in 2014 as a banking Trojan horse, but has evolved over the intervening years, updating itself multiple times a day, as it gets ever more sophisticated in its attempt to spread aggressively and bypass defences.

How does a computer become infected with Emotet?

Typically infections are spread via poisoned email attachments. For instance, last February boobytrapped Word documents were sent out pretending to be related to the Coronavirus pandemic.

Victims are lured into opening the Word document, and then duped into enabling macros which will download the Emotet malware and then install further malware onto infected PCs, and attempt to spread across your network.

Email attachment malware. That doesn’t sound that earth-shattering

It may not be that novel, but it works very well. And Emotet did it at scale – with often half a million Emotet-infected emails being sent each day.

And email attachment malware is not the only trick up Emotet’s sleeve.

Last year, for instance, security researchers discovered a previously-unknown capability within Emotet to hunt for Wi-Fi networks in its vicinity and connect to them (attempting to break passwords if necessary), and then hunt for exposed computers on the same network to infect.

So once it has infected your network, what does it do?

Hackers now have remote access to your infected devices, which means they can not only steal data from you and spy on your activities, but also plant other malware such as ransomware.

Over time the highly organised gang behind Emotet began to rent out access to their botnet of infected PCs to other cybercriminals, such as those operating the Ryuk and Trickbot malware.

OK, so it’s nasty. So what have the police done about it?

Law enforcement agencies have been able to take down Emotet’s infrastructure from the inside, seizing control of the many command-and-control servers located around the world that sent instructions to infected PCs and assisted other cybercriminal gangs.

This sounds like a major victory for cybercrime-fighting agencies.

Yes, Emotet is estimated to be involved in some 30% of all malware attacks. Anything which disrupts its activity is a significant achievement which should be welcomed by all computer users.

Furthermore, as ZDNet reports, law enforcement agencies in the Netherlands are planning to push out an actual update to Emotet designed to remove it from all infected computers at mid-day on March 25, 2021.

Why wait until March 25?

Removing an Emotet infection without the knowledge of the victim has one significant drawback – the user may not ever know that their computers were once compromised. The very existence of Emotet, if discovered by a company or home user, can act as an alarm that other malware may have been implanted on their computers by different gangs or if a data breach occurred.

After March 25, with Emotet gone, it will be more difficult to investigate what may have happened. So check your systems now if you are concerned.

What else should I be doing about this?

It should go without saying that you should keep your anti-virus software and other security defences updated, and your PCs patched. And always use strong, unique, hard-to-crack passwords. In addition, always be wary of unsolicited email attachments, and never enable macros in a Word document unless you are absolutely convinced it is legitimate.

Further to that, however, police in the Netherlands say that they seized a database of some 600,000 email addresses and passwords from one of Emotet’s servers. If you want to check if your details might have been compromised you can visit a page on the Dutch National Police website the authorities have created which will notify you if you are at risk.


Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Emotet botnet takedown – what you need to know” appeared first on TripWire

Source:TripWire – Graham Cluley

Tags: Coronavirus, Malware, Ransomware, TripWire

Continue Reading

Previous Authorities Seize Dark-Web Site Linked to the Netwalker Ransomware
Next Italy CERT Warns of a New Credential Stealing Android Malware

More Stories

  • Cyber Attacks
  • Data Breach

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

6 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

10 hours ago [email protected] (The Hacker News)
  • Data Breach

The Buyer’s Guide to AI Usage Control

11 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

13 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

17 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

18 hours ago [email protected] (The Hacker News)

Recent Posts

  • AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
  • ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
  • The Buyer’s Guide to AI Usage Control
  • Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
  • Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT