{"id":14836,"date":"2019-03-14T08:10:03","date_gmt":"2019-03-14T16:10:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/03\/14\/news-8585\/"},"modified":"2019-03-14T08:10:03","modified_gmt":"2019-03-14T16:10:03","slug":"news-8585","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/03\/14\/news-8585\/","title":{"rendered":"Emotet revisited: pervasive threat still a danger to businesses"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Thu, 14 Mar 2019 15:00:00 +0000<\/strong><\/p>\n<p>One of the most common and pervasive threats for businesses today is <a href=\"http:\/\/www.malwarebytes.com\/emotet\" target=\"_blank\" rel=\"noopener\">Emotet<\/a>, a banking Trojan turned downloader that has been on our <a href=\"https:\/\/blog.malwarebytes.com\/threats\/\" target=\"_blank\" rel=\"noopener\">list of top 10 detections<\/a> for many months in a row. Emotet, which Malwarebytes detects as\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/detections\/trojan-emotet\/\" target=\"_blank\" rel=\"noopener\">Trojan.Emotet<\/a>, has been leveled at consumers and organizations across the globe, fooling users into infecting endpoints through phishing emails, and then spreading laterally through networks using stolen NSA exploits. Its modular, polymorphic form, and ability to drop <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/emotet-malware-gets-more-aggressive-\/d\/d-id\/1333584\" target=\"_blank\" rel=\"noopener\">multiple, changing payloads<\/a> have made Emotet a thorn in the side of cybersecurity researchers and IT teams alike.<\/p>\n<p>Emotet first appeared on the scene as a banking Trojan, but its effective combination of persistence and network propagation has turned it into a popular infection mechanism for other forms of malware, such as <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/11\/trickbot-takes-top-business-threat\/\" target=\"_blank\" rel=\"noopener\">TrickBot<\/a>\u00a0and <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/ryuk-ransomware-attacks-businesses-over-the-holidays\/\" target=\"_blank\" rel=\"noopener\">Ryuk<\/a> ransomware. It has also earned a reputation as one of the hardest-to-remediate infections once it has infiltrated an organization&#8217;s network.<\/p>\n<div id=\"attachment_27386\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/Emotet_Graph.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27386\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/emotet-revisited-this-pervasive-persistent-threat-is-still-a-danger-to-businesses\/attachment\/emotet_graph\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/Emotet_Graph.png\" data-orig-size=\"1585,743\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Emotet_Graph\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/Emotet_Graph-300x141.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/Emotet_Graph-600x281.png\" class=\"size-large wp-image-27386\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/Emotet_Graph-600x281.png\" alt=\"Emotet Graph\" width=\"600\" height=\"281\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/Emotet_Graph-600x281.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/Emotet_Graph-300x141.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/Emotet_Graph.png 1585w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Emotet detections March 12, 2018 \u2013 February 23, 2019<\/p>\n<\/div>\n<p>In July 2018, the US Department of Homeland Security issued a <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA18-201A\" target=\"_blank\" rel=\"noopener\">Technical Alert<\/a> through CISA (Cyber-Infrastructure) about Emotet, warning that:<\/p>\n<blockquote>\n<p>\u201cEmotet continues to be among the most costly and destructive malware affecting SLTT governments. Its worm-like features result in rapidly spreading network-wide infection, which are difficult to combat. Emotet infections have cost SLTT governments up to $1 million per incident to remediate.\u201d<\/p>\n<\/blockquote>\n<h3>From banking Trojan to botnet<\/h3>\n<p>Emotet started out in 2014 as an information-stealing banking Trojan that scoured sensitive financial information from infected systems (which is the reason why Malwarebytes detects some components as <a href=\"https:\/\/blog.malwarebytes.com\/detections\/spyware-emotet\/\" target=\"_blank\" rel=\"noopener\">Spyware.Emotet<\/a>). However, over time Emotet and its business model evolved, switching from a singular threat leveled at specific targets to a botnet that distributes multiple malware payloads to industry verticals ranging from governments to schools.<\/p>\n<p>Emotet was designed to be modular, with each module having a designated task. One of its modules is a Trojan downloader that downloads and runs additional malware. At first, Emotet started delivering other banking Trojans on the side. However, its modular design made it easier for its authors\u2014a group called Mealybug\u2014to adapt the malware or swap functionality between variants. Later versions began dropping newer and more sophisticated payloads that held files for ransom, stole personally identifiable information (PII), spammed other users with phishing emails, and even cleaned out cryptocurrency wallets.\u00a0All of these sidekicks were happy and eager to make use of the stubborn nature of this threat.<\/p>\n<h3>Infection mechanism<\/h3>\n<p>We have discussed some of the structure and flow of Emotet&#8217;s infection vectors in detail <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/malware-analysis-decoding-emotet-part-1\/\">here<\/a> and <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/06\/malware-analysis-decoding-emotet-part-2\/\">here<\/a> by decoding an example. What most Emotet variants have in common is that the initial infection mechanism is\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/malspam\/\" target=\"_blank\" rel=\"noopener\">malspam<\/a>. At first, infections were initiated from Javascript files attached to emails; later, (and still true today) it was via infected Word documents that downloaded and executed the payload.<\/p>\n<p>A considerable portion of Emotet malspam is generated by the malware&#8217;s own spam module that sends out malicious emails to the contacts it finds on an infected system. This makes the emails appear as though they&#8217;re coming from a known sender. Recipients of email from a known contact are more likely to open the attachment and become the next victim\u2014a classic <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/social-engineering-attacks-what-makes-you-susceptible\/\" target=\"_blank\" rel=\"noopener\">social engineering technique<\/a>.<\/p>\n<p>Besides spamming other endpoints, Emotet also propagates through the popular <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/12\/how-threat-actors-are-using-smb-vulnerabilities\/\" target=\"_blank\" rel=\"noopener\">EternalBlue vulnerability<\/a>\u00a0stolen from the NSA and released by the\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/shadowbrokers-fails-to-collect-1m-bitcoins-releases-stolen-information\/\">ShadowBrokers Group<\/a>. This functionality allows the infection to spread laterally across a network of unpatched systems, which makes it even more dangerous to businesses that have hundreds or thousands of endpoints linked together.<\/p>\n<h3>Difficult to detect and remove<\/h3>\n<p>Emotet has several methods for maintaining persistence, including auto-start registry keys and services, and it uses modular Dynamic Link Libraries (DLLs) to continuously evolve. Because Emotet is polymorphic and modular, it can evade typical signature-based detection.<\/p>\n<p>In fact, not only is Emotet difficult to detect, but also to remediate.<\/p>\n<p>A major factor that frustrates remediation is the aforementioned lateral movement via EternalBlue. This particular exploit requires admins follow a strict policy of isolating infected endpoints from the network, patching, disabling Administrative Shares, and ultimately removing the Trojan before reconnecting to the network\u2014otherwise, face the certainty that cleaned endpoints will become re-infected over and over by infected peers.<\/p>\n<p>Add to that mix an ongoing development of new capabilities, including the ability to be VM-aware, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/emotet-returns-from-the-holidays-with-new-tricks\/\" target=\"_blank\" rel=\"noopener\">avoid spam filters<\/a>, or uninstall security programs, and you&#8217;ll begin to understand why Emotet is every networks administrators\u2019 worst nightmare.<\/p>\n<h3>Recommended remediation steps<\/h3>\n<p>An effective, though time-consuming method for disinfecting networked systems has been established. The recommended steps for remediation are as follows:<\/p>\n<ul>\n<li>Identify the infected systems by looking for Indicators of Compromise (IOCs)<\/li>\n<li>Disconnect the infected endpoints from the network. Treat systems where you have even the slightest doubt as infected.<\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/security-updates\/securitybulletins\/2017\/ms17-010\">Patch the system for EternalBlue<\/a>. Patches for many Windows versions can be found through this Microsoft Security Bulletin about <a href=\"https:\/\/docs.microsoft.com\/en-us\/security-updates\/securitybulletins\/2017\/ms17-010\">MS17-010<\/a>.<\/li>\n<li>Disable administrative shares, because Emotet also spreads itself over the network through default admin shares. TrickBot, one of Emotet&#8217;s trusty sidekicks, also uses the Admin$ shares once it has brute forced the local administrator password. A file share server has an IPC$ share that TrickBot queries to get a list of all endpoints that connect to it.<\/li>\n<li>Scan the system and <a href=\"https:\/\/www.malwarebytes.com\/business\/incidentresponse\/\" target=\"_blank\" rel=\"noopener\">clean the Emotet infection<\/a>.<\/li>\n<li>Change account credentials, including all local and domain administrator passwords, as well as passwords for email accounts to stop the system from being accessible to the Trojan.<\/li>\n<\/ul>\n<h3>Prevention<\/h3>\n<p>Obviously, it&#8217;s preferable for businesses to avoid Emotet infections in the first place, as remediation is often costly and time-consuming. Here are some things you can do to prevent getting infected with Emotet:<\/p>\n<ul>\n<li><strong>Educate users<\/strong>: Make sure end users are aware of the dangers of Emotet and know how to recognize malspam\u2014its primary infection vector. Train users on <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/somethings-phishy-how-to-detect-phishing-attempts\/\" target=\"_blank\" rel=\"noopener\">how to detect phishing attempts<\/a>, especially those that are spoofed or <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/02\/sophisticated-phishing-a-roundup-of-noteworthy-campaigns\/\" target=\"_blank\" rel=\"noopener\">more sophisticated<\/a> than, say, the Nigerian Prince.<\/li>\n<li><strong>Update software regularly<\/strong>: Applying the latest updates and patches reduces the chances of Emotet infections spreading laterally through networks via EternalBlue vulnerabilities. If not already implemented, consider automating those updates.<\/li>\n<li><strong>Limit administrative shares:<\/strong> to the absolute minimum for Emotet damage control.<\/li>\n<li><strong>Use safe passwords: <\/strong>Yes, it really is that important to use unique, strong passwords for each online account.\u00a0Investigate, adopt, and role out a single\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/05\/dont-need-27-different-passwords\/\" target=\"_blank\" rel=\"noopener\">password manager<\/a>\u00a0for all of the organization&#8217;s users.<\/li>\n<li><strong>Back up files<\/strong>: Some variants of Emotet also download ransomware, which can hold now-encrypted files hostage, rendering them useless unless a ransom is paid. Since we and the <a href=\"https:\/\/www.forbes.com\/sites\/haroldstark\/2017\/02\/28\/when-attacked-by-ransomware-the-fbi-says-you-shouldnt-pay-up\/#15a494ef5e61\" target=\"_blank\" rel=\"noopener\">FBI recommend never paying the ransom<\/a>\u2014as it simply finances future attacks and paints a target on an organization&#8217;s back\u2014having\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/04\/3-2-1-go-make-backups-of-your-data\/\" target=\"_blank\" rel=\"noopener\">recent and easy-to-deploy backups<\/a> is always a good idea.<\/li>\n<\/ul>\n<h3>IOCs<\/h3>\n<p><strong>Persistence<\/strong><\/p>\n<p>C:WindowsSystem32randomnumber<br \/> C:WindowsSystem32tasksrandomname<br \/> C:Windows[randomname]<br \/> C:users[myusers]appdataroaming[random]<br \/> %appdata%RoamingMicrosoftWindowsStart MenuProgramsStartup [Randomname].LNK. file in the startup folder<\/p>\n<p><strong>Registry keys<\/strong><\/p>\n<p>HKEY_LOCAL_MACHINESystemCurrentControlSetServices {Random Hexadecimal Numbers}<br \/> HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionRun {Random Names} with value c:usersadminappdataroaming{Random}{Legitimate Filename}.exe<\/p>\n<p><strong>Filename examples<\/strong><\/p>\n<p>PlayingonaHash.exe<br \/> certapp.exe<br \/> CleanToast.exe<br \/> CciAllow.exe<br \/> RulerRuler.exe<br \/> connectmrm.exe<\/p>\n<p><strong>Strings<\/strong><\/p>\n<p>C:email.doc<br \/> C:123email.doc<br \/> C:123email.docx<br \/> C:afoobar.bmp<br \/> X:Symbolsa<br \/> C:loaddll.exe<br \/> C:email.htm<br \/> C:take_screenshot.ps1<br \/> C:afoobar.gif<br \/> C:afoobar.doc<\/p>\n<p><strong>Subject Filters<\/strong><\/p>\n<p>\u201cUPS Ship Notification, Tracking Number\u201d<br \/> \u201cUPS Express Domestic\u201d<br \/> \u201cTracking Number *\u201d<\/p>\n<p><em>Trick to check whether a UPS tracking number is real: a legitimate UPS tracking number contains eighteen alpha-numeric characters and starts with \u20181Z\u2019 and ends with a check digit.<\/em><\/p>\n<p><em>A number matching this format may still be false, but one that doesn\u2019t match is certainly not real.<\/em><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/emotet-revisited-this-pervasive-persistent-threat-is-still-a-danger-to-businesses\/\">Emotet revisited: pervasive threat still a danger to businesses<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/emotet-revisited-this-pervasive-persistent-threat-is-still-a-danger-to-businesses\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Thu, 14 Mar 2019 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/emotet-revisited-this-pervasive-persistent-threat-is-still-a-danger-to-businesses\/' title='Emotet revisited: pervasive threat still a danger to businesses'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/shutterstock_1081269428.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Emotet is often mentioned as one of the most annoying, effective, and costly present-day malware infections. We discuss the reasons why and the proper way to remove it.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/malware\/\" rel=\"category tag\">Malware<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/banking-trojan\/\" rel=\"tag\">banking Trojan<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/botnet\/\" rel=\"tag\">botnet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/emotet\/\" rel=\"tag\">emotet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eternalblue\/\" rel=\"tag\">EternalBlue<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/information-stealer\/\" rel=\"tag\">information stealer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ryuk-ransomware\/\" rel=\"tag\">Ryuk ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/smb-vulnerabilities\/\" rel=\"tag\">SMB vulnerabilities<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trickbot\/\" rel=\"tag\">trickbot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan\/\" rel=\"tag\">trojan<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/emotet-revisited-this-pervasive-persistent-threat-is-still-a-danger-to-businesses\/' title='Emotet revisited: pervasive threat still a danger to businesses'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/emotet-revisited-this-pervasive-persistent-threat-is-still-a-danger-to-businesses\/\">Emotet revisited: pervasive threat still a danger to businesses<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11990,10410,4503,15715,12319,21260,3764,20562,20435,13256,10833],"class_list":["post-14836","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-banking-trojan","tag-botnet","tag-cybercrime","tag-emotet","tag-eternalblue","tag-information-stealer","tag-malware","tag-ryuk-ransomware","tag-smb-vulnerabilities","tag-trickbot","tag-trojan"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14836"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14836\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14836"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}