Emotet malware attacks up 1,200% in Q3: 5 things to know

HP noted a significant increase in destructive spam campaigns utilizing Emotet malware throughout the third quarter in the “HP-Bromium Threat Insights Report, October 2020.”
5 takeaways:
1. Malicious spam campaigns dispersing Emotet malware were up 1,200 percent in the third quarter compared to the 2nd quarter. Emotet is often utilized to release infections including TrickBot to jeopardized computer system systems.
2. Emotet malware is frequently a precursor to ransomware attacks run by human beings, according to the report. The report noted Trojans were the malware types used in 43 percent of attacks, followed by potentially unwanted applications at 21 percent and downloaders at 6 percent.
3. During the third quarter, 25 percent of the Emotet spam was sent to.org domains to offer ransomware actors access to systems including Microsoft Windows. In Windows, Emotet convinces users to run a destructive Word document emailed to them.
4. When in the system, Emotet responds to email threads with a destructive attachment or hyperlink to spread, apparently from a familiar sender.
5. The report keeps in mind an atypical spam campaign identified in July provided TrickBot banking malware with ingrained payloads in Word documents; a 2nd, bigger project was discovered in September.

More short articles on cybersecurity: Updates on 5 medical facility cyberattacksHackers target Microsoft Windows vulnerability: 5 detailsOhio hospital inadvertently published secured health details online: 4 details

Malicious spam projects distributing Emotet malware were up 1,200 percent in the 3rd quarter compared to the second quarter. Emotet malware is frequently a precursor to ransomware attacks operated by human beings, according to the report. Throughout the 3rd quarter, 25 percent of the Emotet spam was sent out to.org domains to provide ransomware stars access to systems including Microsoft Windows.

© Copyright ASC COMMUNICATIONS 2020. Intrigued in LINKING to or REPRINTING this content? View our policies by clicking here.