Warnings of a rise in emotet attacks
Warnings of a rise in emotet attacks

Cybersecurity agencies in France, Japan, and New Zealand issued security alerts last week warning of a significant increase in Emotet malware attacks against their countries.

The alert described Emotet activities through spam campaigns from Emotet infrastructure, target companies and government agencies in three countries.

Victim organizations that receive e-mail, open attachments, and execute them are at risk of being infected with one of the most dangerous malware today.

Joseph Rosen, a member of the Cryptolaemus security research team, tracks Emotet malware attacks and says the Emotet network has been particularly active for the past three weeks.

Rosen mentioned that Emotet has used New Zealand as its primary email destination for E3, one of the three robot networks that make up Emotet's infrastructure.

While E3 was busy sending spam to New Zealand, the three robots (E1), (E2) and (E3) were destined for Japan.

According to the Computer Emergency Response Team in Japan (CERT Japan), these waves of spam tripled Emotet's opinion last week, prompting experts to issue warnings.

As Japan and New Zealand suffer from a wave of SPAM, the situation in France has improved.

However, the Emotet attack attacked the computers on the justice network in Paris, drawing people's attention, getting the attention of the media, and creating an emergency for French officials.

After that, the French Interior Ministry prevented all office documents from being sent via e-mail. France's Cybersecurity Agency (ANSSI) has issued an official cybersecurity warning asking government agencies to be careful about opening emails.

According to these three warnings, the attacks appear to be similar, with Emotet operators using outdated technology to infect a victim and steal old email. Then the team activated those old conversations, added malicious files as attachments, and prevented new users from having conversations that seemed real. .

Users often open malicious attachments added to threaded email messages out of curiosity.

The affected company must completely remove its network and verify the entire system as (Emotet) has a feature that allows it to spread to the entire network. Emotet is usually used to download other malware. Including ransomware.

Previous Post Next Post