Cyber-security researchers are warning about a powerful email malware, which is targeting government and military systems. The Emotet malware is often used as an initial attack vector, to allow access for Trickbots and ransomware.
Three Months At The Top
December saw the Emotet malware lead the biggest threat charts for the third month running. Its main attack vector is through spam email campaigns containing a malicious link or Microsoft Word document. These have covered subject matters as diverse as ‘Greta Thunberg’ and ‘Christmas Party’.
Clicking the link or opening the document will download Emotet to the computer. At this point the malware will try to propagate itself by harvesting email contacts, and continuing the spam cycle. However it can also analyse regular contacts, and even respond to ongoing email threads, making it harder to recognise as a threat.
Malware Pivots To Military And Government Targets
At some point in the past few months, Emotet managed to successfully compromise one or more targets in the US government. This has led to an increase in infected emails targeting addresses with .gov and .mil top-level domains in December 2019.
After a brief break for Orthodox Christmas (even malware celebrates the holidays, it seems), then trend has continued into January 2020.
The malware can also mimic email language. In one example, an email was sent targeting a staff member of US Senator, Cory Booker. The infected email included signatures indicating that it originated from someone else using the booker.senate.gov tag.
Once Infected Doors Are Open, Ransomware Enters
Emotet is a financially motivated malware, explains Cisco Talos researcher Nick Biasini.
There’s a lot of examples of Emotet being an initial infection vector where you see Emotet but then you see a Trickbot is dropped and that’s followed up by a ransomware. So if you’ve seen a lot of these big game hunting attacks, Emotet plays a role in that as well.
Ransomware tends to access and encrypt a system’s data, with operators demanding payment in bitcoin or cryptocurrency for the decryption key.
As Bitcoinist reported, the US Coast Guard was caught out by such an attack at the end of last year.
Cryptojacking Still a Leading Malware Concern
The second-placed malware in Check Point Research’s ‘most wanted’ chart for December 2019 is XMRig. This is an open-source software for hijacking CPU resources for mining Monero. In many ways it is quite impressive that this malware still rates so highly, as it has been ‘in the wild’ since May 2017.
Are you concerned about the highly sophisticated Emotet malware? Add your thoughts below!
Images via Shutterstock The post appeared first on Bitcoinist.com. origin »
Notorious threat actors like Potao Express, BlackEnergy and Turla account for as many as 79 unique malware families that have been used to infiltrate European government and military computers and target “high-value” entities across Ukraine, Russia, Georgia, and Belarus for information harvesting.
An intelligence branch of the Russian government used bitcoin to fund its cyberwarfare efforts to interfere with the 2016 U. S. presidential election, the Mueller Report claims.
North Korean cybercrime hacking group The Lazarus Group is currently the biggest crypto hacking syndicate in the world, having stolen millions worth of cryptocurrencies from online exchanges.
TRM Labs identified nine new ransomware groups that extensively use AI to scam their victims. Since the latest AI tools emerged, scammers have been using them in their attacks. On Monday, Oct. 6, blockchain analytics platform TRM Labs published a…
Attackers are increasingly deploying AI tools to execute ransomware attacks at scale With the increased availability of AI tools, scammers are deploying ransomware at scale. According to a report by OutreachX, automation and AI are contributing to a significant increase…
The Embargo ransomware group has stolen $34.2 million since emerging in April 2024, targeting victims across the healthcare, business services, and manufacturing.
Ransomware attacks surged last year, but victim payments declined as users refused to meet demands amid increased recovery efficiency by law enforcement.
The U.S. Department of Justice has charged Rostislav Panev, a dual Russian and Israeli national, for his alleged involvement with the LockBit ransomware group. Panev, 51, is accused of working as a developer for the group, earning over $230,000 in…
Toronto police are investigating the kidnapping of Dean Skurka, CEO of WonderFi. Skurka was abducted in downtown Toronto during rush hour on Wednesday, Nov. 6. He was later released after a $1 million ransom was paid electronically, per CBC. The…
Cencora, a healthcare solutions provider, paid a total of $75 million to a ransomware group earlier this year, according to Bloomberg. The publicly traded drug distributor, formerly known as AmerisourceBergen, reportedly sent Bitcoin (BTC) worth $75 million to cyberattackers following…