Did You Know? For the last four months Emotet, one of today’s most costly and destructive malware, has been hibernating, its spam modules silent and C&C servers lying dormant.
But on September 16, the dangerous botnet sprang back to life, threatening organizations with a new spear phishing campaign that hijacks old email threads and refers to users by name in the subject line—a social engineering tactic used previously by North Korean nation-state actors.
Most of Emotet’s latest malspam is disguised as invoices with malicious attachments that, once opened, launch the infection and begin the spamming process once again, capturing contacts from the affected endpoint and delivering more compromised emails to those in the network and beyond. Download the Emotet Emergency Kit here - https://tinyurl.com/y3ko6tkv