How does the Emotet trojan activates its remote copies?
The Emotet trojan is active again and I read a bit about how it propagates. This includes phishing and having users launch all kind of files (exes, fiels with macros, …) – a typical method.
It also scans the network for wr… Continue reading How does the Emotet trojan activates its remote copies?