top of page
Search

Emotet returns and deploys loaders

The Emotet malware appears to have come back after a four-month lull, according to a cybersecurity researcher and a French security expert who was involved in a series of investigations into the threat.




TARGETED COUNTRIES: United States of America, France


MALWARE FAMILIES: EmoCheck, IcedID, Qbot, SilentBuilder, Trickbot, Emotet


ATT&CK IDS: T1027 - Obfuscated Files or Information, T1036 - Masquerading, T1040 - Network Sniffing, T1049 - System Network Connections Discovery, T1102 - Web Service, T1106 - Native API, T1137 - Office Application Startup, T1218 - Signed Binary Proxy Execution, T1547 - Boot or Logon Autostart Execution, T1566 - Phishing, T1573 - Encrypted Channel


Read More:

2 views

Comments


Commenting has been turned off.
bottom of page