The Emotet malware appears to have come back after a four-month lull, according to a cybersecurity researcher and a French security expert who was involved in a series of investigations into the threat.
TARGETED COUNTRIES: United States of America, France
MALWARE FAMILIES: EmoCheck, IcedID, Qbot, SilentBuilder, Trickbot, Emotet
ATT&CK IDS: T1027 - Obfuscated Files or Information, T1036 - Masquerading, T1040 - Network Sniffing, T1049 - System Network Connections Discovery, T1102 - Web Service, T1106 - Native API, T1137 - Office Application Startup, T1218 - Signed Binary Proxy Execution, T1547 - Boot or Logon Autostart Execution, T1566 - Phishing, T1573 - Encrypted Channel
Read More:
Comentários