{"id":16322,"date":"2019-09-16T10:10:05","date_gmt":"2019-09-16T18:10:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/09\/16\/news-10063\/"},"modified":"2019-09-16T10:10:05","modified_gmt":"2019-09-16T18:10:05","slug":"news-10063","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/09\/16\/news-10063\/","title":{"rendered":"Emotet is back: botnet springs back to life with new spam campaign"},"content":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Mon, 16 Sep 2019 17:04:53 +0000<\/strong><\/p>\n<p>After a fairly long hiatus that lasted nearly four months, <a href=\"http:\/\/www.malwarebytes.com\/emotet\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Emotet (opens in a new tab)\">Emotet<\/a> is back with an active spam distribution campaign. For a few weeks, there were signs that the botnet was setting its gears in motion again, as we observed command and control (C2) server activity. But this morning, the Trojan started pumping out spam, a clear indication it&#8217;s ready to jump back into action.<\/p>\n<p>The malicious emails started in the wee hours of Monday morning, with templates spotted in German, <a rel=\"noreferrer noopener\" aria-label=\"Polish (opens in a new tab)\" href=\"https:\/\/twitter.com\/spamhaus\/status\/1173512556960452608?s=20\" target=\"_blank\">Polish<\/a>, and <a rel=\"noreferrer noopener\" aria-label=\"Italian (opens in a new tab)\" href=\"https:\/\/twitter.com\/JAMESWT_MHT\/status\/1173602910132944896?s=20\" target=\"_blank\">Italian<\/a>. Our Threat Intelligence team has also captured phishing samples sent in English.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"40453\" data-permalink=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-is-back-botnet-springs-back-to-life-with-new-spam-campaign\/attachment\/emotet_email\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/Emotet_email.png\" data-orig-size=\"666,486\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Emotet_email\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/Emotet_email-300x219.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/Emotet_email-600x438.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/Emotet_email.png\" alt=\"\" class=\"wp-image-40453\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/Emotet_email.png 666w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/Emotet_email-300x219.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/Emotet_email-600x438.png 600w\" sizes=\"(max-width: 666px) 100vw, 666px\" \/><\/figure>\n<\/div>\n<p>Victims are lured to open the attached document and enable the macro to kick-start the infection process.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/document.png\" data-rel=\"lightbox-0\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40447\" data-permalink=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-is-back-botnet-springs-back-to-life-with-new-spam-campaign\/attachment\/document-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/document.png\" data-orig-size=\"858,657\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"document\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/document-300x230.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/document-600x459.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/document.png\" alt=\"\" class=\"wp-image-40447\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/document.png 858w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/document-300x230.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/document-600x459.png 600w\" sizes=\"(max-width: 858px) 100vw, 858px\" \/><\/a><\/figure>\n<\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/flow.png\" data-rel=\"lightbox-1\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40449\" data-permalink=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-is-back-botnet-springs-back-to-life-with-new-spam-campaign\/attachment\/flow-39\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/flow.png\" data-orig-size=\"844,661\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"flow\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/flow-300x235.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/flow-600x470.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/flow.png\" alt=\"\" class=\"wp-image-40449\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/flow.png 844w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/flow-300x235.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/flow-600x470.png 600w\" sizes=\"(max-width: 844px) 100vw, 844px\" \/><\/a><\/figure>\n<\/div>\n<p>The PowerShell command triggered by the macro will attempt to download Emotet from compromised sites, often running the WordPress CMS.<\/p>\n<p>Once installed on the endpoint, Emotet attempts to spread laterally, in addition to stealing passwords from installed applications. Perhaps the biggest threat, though, is that Emotet serves as a delivery vector for more dangerous payloads, such as <a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2019\/08\/ransomware-continues-assault-against-cities-and-businesses\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"ransomware (opens in a new tab)\">ransomware<\/a>.<\/p>\n<p>Compromised machines can lay in a dormant state until operators decide to hand off the job to other criminal groups that will attempt to extort large sums of money from their victims. In the past, we&#8217;ve seen the infamous <a rel=\"noreferrer noopener\" aria-label=\"Ryuk (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/detections\/ransom-ryuk\/\" target=\"_blank\">Ryuk<\/a> ransomware <a rel=\"noreferrer noopener\" aria-label=\"being deployed that way (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/malware\/2019\/01\/ryuk-ransomware-attacks-businesses-over-the-holidays\/\" target=\"_blank\">being deployed that way<\/a>.<\/p>\n<p>While Emotet is typically focused on infecting organizations, Malwarebytes business and individual customers <a href=\"http:\/\/www.malwarebytes.com\/business\">are already protected <\/a>against this campaign, thanks to our signature-less anti-exploit technology. As always, we recommend users be cautious when <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/06\/five-easy-ways-to-recognize-and-dispose-of-malicious-emails\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"opening emails with attachments (opens in a new tab)\">opening emails with attachments<\/a>, even if they appear to come from acquaintances. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/Emotet_block.gif\" data-rel=\"lightbox-2\" title=\"\"><img decoding=\"async\" data-attachment-id=\"40454\" data-permalink=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-is-back-botnet-springs-back-to-life-with-new-spam-campaign\/attachment\/emotet_block\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/Emotet_block.gif\" data-orig-size=\"678,716\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Emotet_block\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/Emotet_block-284x300.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/Emotet_block-568x600.gif\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/Emotet_block.gif\" alt=\"\" class=\"wp-image-40454\"\/><\/a><\/figure>\n<\/div>\n<p>As this campaign is not even a day old, we don&#8217;t yet know the impact on organizations and other users. We will continue to update this post as we learn more throughout the day. In the meantime, warn your coworkers, friends, and family to be wary of emails disguised as invoices or any other <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/somethings-phishy-how-to-detect-phishing-attempts\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"&quot;phishy&quot; (opens in a new tab)\">&#8220;phishy&#8221;<\/a> instances.<\/p>\n<h3>Indicators of Compromise<\/h3>\n<p><strong>Malicious Word document<\/strong><\/p>\n<p>eee144531839763b15051badbbda9daae38f60c02abaa7794a046f96a68cd10b<\/p>\n<p><strong>Hacked WordPress websites hosting the Emotet binary<\/strong><\/p>\n<p>danangluxury[.]com\/wp-content\/uploads\/KTgQsblu\/<br \/>gcesab[.]com\/wp-includes\/customize\/zUfJervuM\/<br \/>autorepuestosdml[.]com\/wp-content\/CiloXIptI\/<\/p>\n<p><strong>Emotet binary<\/strong><\/p>\n<p>8f05aa95aa7b2146ee490c2305a2450e58ce1d1e3103e6f9019767e5568f233e<\/p>\n<p><strong>Post-infection traffic<\/strong><\/p>\n<p>179.12.170[.]88:8080\/results\/tlb\/<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-is-back-botnet-springs-back-to-life-with-new-spam-campaign\/\">Emotet is back: botnet springs back to life with new spam campaign<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-is-back-botnet-springs-back-to-life-with-new-spam-campaign\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Mon, 16 Sep 2019 17:04:53 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-is-back-botnet-springs-back-to-life-with-new-spam-campaign\/' title='Emotet is back: botnet springs back to life with new spam campaign'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/09\/shutterstock_1154383498.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>After months of laying dormant, the notorious Emotet is back, with its botnet spewing spam globally.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/botnets\/\" rel=\"category tag\">Botnets<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/botnet\/\" rel=\"tag\">botnet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/botnets\/\" rel=\"tag\">botnets<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/downloader\/\" rel=\"tag\">downloader<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/emotet\/\" rel=\"tag\">emotet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/information-stealer\/\" rel=\"tag\">information stealer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malicious-email\/\" rel=\"tag\">malicious email<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malspam\/\" rel=\"tag\">malspam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ryuk-ransomware\/\" rel=\"tag\">Ryuk ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spam\/\" rel=\"tag\">spam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spear-phishing\/\" rel=\"tag\">spear phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trickbot\/\" rel=\"tag\">trickbot<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-is-back-botnet-springs-back-to-life-with-new-spam-campaign\/' title='Emotet is back: botnet springs back to life with new spam campaign'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-is-back-botnet-springs-back-to-life-with-new-spam-campaign\/\">Emotet is back: botnet springs back to life with new spam campaign<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10410,11195,11382,15715,21260,22948,11928,3924,20562,10518,11727,13256],"class_list":["post-16322","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-botnet","tag-botnets","tag-downloader","tag-emotet","tag-information-stealer","tag-malicious-email","tag-malspam","tag-phishing","tag-ryuk-ransomware","tag-spam","tag-spear-phishing","tag-trickbot"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16322"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16322\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16322"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}