top of page

Emotet returns and deploys loaders

The Emotet malware appears to have come back after a four-month lull, according to a cybersecurity researcher and a French security expert who was involved in a series of investigations into the threat.

TARGETED COUNTRIES: United States of America, France

MALWARE FAMILIES: EmoCheck, IcedID, Qbot, SilentBuilder, Trickbot, Emotet

ATT&CK IDS: T1027 - Obfuscated Files or Information, T1036 - Masquerading, T1040 - Network Sniffing, T1049 - System Network Connections Discovery, T1102 - Web Service, T1106 - Native API, T1137 - Office Application Startup, T1218 - Signed Binary Proxy Execution, T1547 - Boot or Logon Autostart Execution, T1566 - Phishing, T1573 - Encrypted Channel

Read More:



Commenting has been turned off.
bottom of page