According to Kaspersky
telemetry, Emotet, a botnet coined "the most dangerous malware in the
world" by Europol,
showed worldwide growth of over 200% in March 2022. This indicates that the
threat actors behind the botnet have been taking steps to significantly
increase their malicious activity for the first time since its comeback in
November 2021.
Emotet is both a botnet, a controlled network of infected
devices used for attacks on other devices, and malware that is capable of
extracting different kinds of data, often pertaining to finance, from infected
devices. Operated by experienced threat actors, it has become one of the
biggest players in the cybercrime world. Emotet was shut down following a joint
effort from various law enforcement agencies in January 2021. However, in
November 2021, the botnet returned and has been gradually increasing its
activity since, first by spreading via Trickbot,
a different bot network, and now by itself via the means of malicious spam
campaigns.
Kaspersky telemetry shows that the number of victims
increased from 2,843 in February 2022 to 9,086 in March, attacking over three
times the number of users. The number of attacks detected by Kaspersky
solutions has grown from 16,897 in February 2022 to 48,597 in March.
A typical Emotet infection begins with spam emails that
contain Microsoft Office attachments with a malicious macro. Using this macro,
the actor can start a malicious PowerShell command to drop and start a module
loader, which can then communicate with a command and control sever to download
and start modules. These modules can perform a variety of different tasks on
the infected device. Kaspersky researchers were able to retrieve and analyze 10
out of 16 modules, with most having been used by Emotet in the past in one form
or another.
The current version of Emotet can create automated spam
campaigns that are further spread down the network from the infected devices.
It is able to then extract emails and email addresses from Thunderbird and Outlook
applications and collecting passwords from popular web browsers such as
Internet Explorer, Mozilla Firefox, Google Chrome, Safari and Opera, to gather
the account details of various email clients.
"Emotet was a highly advanced network that haunted many
organizations around the world. Its takedown was a significant step towards
decreasing threats worldwide by helping to tear apart their network and
removing it from the top threat list for over a year. While the number of
attacks is not comparable to the previous scale of Emotet's operations, the
change in dynamics points to a significant activation of the botnet's operators
and a high likelihood of this threat spreading further in the coming months,' comments
Alexey Shulmin, security researcher at Kaspersky.
Learn more about Emotet modules on Securelist.com,
or watch the documentary about Emotet's takedown on Tomorrow Unlocked.
To help businesses stay protected from Emotet and similar
botnets, experts suggest organizations take the following measures as soon as
possible:
- Keep up to date. Check
for further developments regarding Emotet. There are several ways to do
this, such as visiting the Kaspersky
Resource Center or conducting your own research.
- Do not download dubious
attachments from spam emails or click on suspicious links. If you're
unsure whether an email is fake, avoid risks and contact the sender. If
you are asked to allow a macro to run on a downloaded file, do not do so
under any circumstances and delete the file immediately. This way you will
not give Emotet a chance to get on your computer.
- Use online banking with
multifactor authentication solutions.
- Be sure to install a
full virus and malware protection program, such as Kaspersky Internet
Security, and have it scan your computer regularly for any
vulnerabilities. This will give you the best possible protection against
the latest viruses, spyware etc.
- Make sure your software
is updated - including your operating system and any software
applications, (attackers exploit loopholes in widely used programs to gain
entry).
- Invest in
regular cybersecurity awareness training for employees to
educate them on best practices, such as not clicking on links or opening
attachments received from untrusted sources. Follow this up with a
simulated phishing attack to ensure they know how to distinguish phishing
emails.