Emotet Operators Are Using Wuhan Virus Info to Spread Malware

Emotet operators are looking to pray on people’s fears to spread malware through malicious emails. In this case, they are using the real health crisis of the coronavirus outbreak in China. Using people’s fears to spread malware is not new, … Continue reading Emotet Operators Are Using Wuhan Virus Info to Spread Malware

Emotet Operators Are Using Wuhan Virus Info to Spread Malware

Emotet operators are looking to pray on people’s fears to spread malware through malicious emails. In this case, they are using the real health crisis of the coronavirus outbreak in China. Using people’s fears to spread malware is not new, … Continue reading Emotet Operators Are Using Wuhan Virus Info to Spread Malware

Berlin’s high court should rebuild computer system after Emotet infection, report finds

Berlin’s highest court should completely rebuild its computer infrastructure after hackers ran roughshod through the network and likely stole data in the process, according to a forensic report released Monday. Poor security controls allowed the attackers to install two types of information-stealing malware last fall, said the study conducted by an IT subsidiary of Deutsche Telekom and released by German lawmakers investigating the incident. “A motivated attacker would have been able to use this network structure to infect almost every device,” the report states. The court, known as the Kammergericht in German, is the highest court for the city-state of Berlin. It handles criminal and terrorism cases with sensitive witness lists, which could be valuable data in the hands of a profit-seeking attacker. Sven Herpig, a cybersecurity expert with the German think tank SNV, pointed out that attackers are increasingly using data exfiltration as a means of holding victims hostage. […]

The post Berlin’s high court should rebuild computer system after Emotet infection, report finds appeared first on CyberScoop.

Continue reading Berlin’s high court should rebuild computer system after Emotet infection, report finds

[SANS ISC] Complex Obfuscation VS Simple Trick

I published the following diary on isc.sans.edu: “Complex Obfuscation VS Simple Trick“: Today, I would like to make a comparison between two techniques applied to malicious code to try to bypass AV detection. The Emotet malware family does not need to be presented. Very active for years, new waves of

[The post [SANS ISC] Complex Obfuscation VS Simple Trick has been first published on /dev/random]

Continue reading [SANS ISC] Complex Obfuscation VS Simple Trick

Emotet strikes again, targeting 600 United Nations personnel

The Emotet Trojan, identified by security teams in 2014, started out as banking malware meant to steal sensitive data. Initially focused on the financial sectors, the malware later morphed, adding spamming and malware delivery services. Emotet’s … Continue reading Emotet strikes again, targeting 600 United Nations personnel

Emotet strikes again, targeting 600 United Nations personnel

The Emotet Trojan, identified by security teams in 2014, started out as banking malware meant to steal sensitive data. Initially focused on the financial sectors, the malware later morphed, adding spamming and malware delivery services. Emotet’s … Continue reading Emotet strikes again, targeting 600 United Nations personnel