Emotet Returns Just in Time for the Holidays

  • By Dawna M. Roberts
  • Published: Dec 28, 2020
  • Last Updated: Mar 18, 2022

Emotet reemerged after a two-month hiatus just in time for the holidays and according to Threatpost, have been targeting 100,000 victims per day. More recent attacks use a fake error message and downloadable DLL to trick users into infections.

What is Emotet?

Emotet started out as a banking Trojan in 2014. After various iterations, it evolved into a downloader with different payloads. Threatpost cautions that Emotet can install various types of malware on your device including “information stealers, email harvesters, self-propagation mechanisms and ransomware.”

It was more recently used during the Democratic National Convention. Before that it was used by hackers to exploit the Trickbot Trojan and send SMS messages posing as the victims’ bank. Typically after some action, the botnet goes dark for a few weeks before showing up again. 

Emotet botnet is one of the most damaging and prolific threats capable of emailing a volume of users and infecting a massive amount of devices in one campaign. The most common payloads used by Emotet are Trickbot, Qakbot, and ZLoader.

What Happened?

According to CyWare Social, many of the attacks seen right before Christmas were either COVID-related or Christmas themed: 

  • “This recent spam campaign started in mid-December and it could lead to compromised business networks, as people are still working from home.
  • More than 100k+ messages in English, German, Spanish, Italian, and other languages have been discovered. Lures are using thread hijacking with PW-protected zips, Word attachments, and URLs.
  • Emotet has worm-like features that enable network-wide infections. In addition, the trojan now uses modular DLL to regularly update and evolve its capabilities.
  • Proofpoint issued alerts on Twitter on December 21 that showed a screenshot of the social engineering trick fooling recipients into turning off a Microsoft 365 feature that blocks malicious documents.”

Emotet Using Tricknot Botnet

Trickbot botnet is a sophisticated network of servers delivery malicious banking Trojans to victims’s computers. Some of the most common uses are for wire fraud, bank account takeovers and ransomware attacks. 

The latest threat is using Trickbot botnet and Threatpost warns “We’re seeing 100k+ messages in English, German, Spanish, Italian and more. Lures use thread hijacking with Word attachments, pw-protected zips and URLs.”

Thread jacking is when hackers insert themselves into an existing email thread so that the victim trusts the email and never suspects foul play.

Sherrod DeGrippo told Threatpost “Our team is still reviewing the new samples and thus far we’ve only found minor changes. For example, the Emotet binary is now being served as a DLL instead of an .exe,” DeGrippo said. “We typically observe hundreds of thousands of emails per day when Emotet is operating. This campaign is on par for them. As these campaigns are ongoing, we are doing totals on a rolling basis. Volumes in these campaigns are similar to other campaigns in the past, generally around 100,000 to 500,000 per day.”

Taking Advantage of the Holidays

She also mentioned that typically, Emotet takes a break between December 24 and early January but this year, they ramped up operations. Threat researchers also noted that many of the 100k+ emails asked victims to open a .zip attachment (something cybersecurity professionals always warn against) or provide a password for access.

With the hackers using thread hijacking victims are more apt to trust the recipient and provide the requested information or open attachments. As a final precaution threat assessors warn the public to be extra vigilante around this time. In the past, the holidays were a safer time to let your guard down but not this year. Companies and individuals should be on the watch for anything odd or suspicious right now. 

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

What is Single Sign-On: The Benefits and Importance of Implementing SSO

What is Single Sign-On: The Benefits and Importance of Implementing SSO

Every day, more people get online - most do it for leisure, but organizations are increasingly moving into the digital environment.

Personal vs Sensitive Personal Information (SPI): What’s the Difference

Personal vs Sensitive Personal Information (SPI): What’s the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation?

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close