Emotet is back

Just when it looked like the Emotet spamming/malware operation had stopped, there are widespread reports that it has restarted. Emotet botnet starts blasting malware again after 5 month break (bleepingcomputer.com) Infected Microsoft Office documents are Emotet’s favoured method of malware distribution. Once the email has slipped past your technical defences, …

Yes people do track a top ten for malware. Do you want to know what the #1 is?

It’s Emotet – this is obviously where the cyber-criminals are making their money. Emotet reestablishes itself at the top of the malware world • The Register Emotet is operated by an operation called Cryptolaemus, and they have been developing the code to bring the malware back after it had been …

Defunct botnet shows signs of life – cybersecurity advice for you!

The SANS Internet Storm Diary is reporting that the Emotet botnet, that was taken down earlier this year by worldwide Co-operation of law enforcing has started to show up again on their monitoring. Emotet Returns – SANS This botnet distributes malicious packages via email attachments and then deploys these packages …