Disclosure: We are not providing any kind of paid support. Beware of scammers. This page may contain affiliate links read disclaimer

Emotet transformed: malware is made to look like a Word update

Emotet continues to do her thing. Banking Trojan malware arrives in a new guise. It now appears as an update of Microsoft Word through your mail. Or else, through word documents that invite you to download malicious macros. Malware in general is dangerous. However, the cyber community rates Emotet as the most dangerous in the world due to its scope and worm-like qualities. Originally this malware was stealing confidential and private information in the US and European countries. But since its first detection in 2014, it has evolved.

Since August, CISA and MS-ISAC have seen a significant increase in malicious cyber actors targeting state and local governments with Emotet phishing emails. This increase has rendered Emotet one of the most prevalent ongoing threats.

cybersecurity and infrastructure security agency

This is why the United States Department of Homeland Security recently classified it as one of the most frequent threats. This is mainly due to an increase in cyber-attacks since July this year. Despite the fact that malware has apparently been inactive since February of this year. At that time, attacks were carried out by spreading information about COVID-19 by mail.

The new and final ruse is the dissemination of an e-mail notification, apparently from Microsoft Office. In the email, they report a supposed update of the Word tool. At first sight, the update adds “new functions”. In this way, users are persuaded to install it. Otherwise, the mail contains attachments with malicious macros embedded.

Emotet mainly travels via spam emails

How does Emotet work?

Emotet mainly travels via spam emails. Secondly, through attachments or links that when clicked on, download and install the malware on the computer. Subsequently, the Toyano Banker spreads by using the network of users connected to the computer and stealing user credentials and passwords. Likewise, valid accounts, also detecting vulnerabilities in the system and sneaking through them. As well as through looted contact lists.

The danger of the software lies in its rapid propagation, and the ability to evade detection and analysis. Similarly, in that it is polymorphic and can install other malware on infected computers. These characteristics make it aggressive and costly to clean. Given this growing spread of Emotet, we must be covered and be completely suspicious of spam. As well as avoid at all costs downloading files and run unknown files.

How to stay away from Emotet?

Never click on links coming from untrusted sources. Never open emails from unknown senders. Install a good antivirus or antimalware software in the computer. Checkout here Best antivirus for Windows and best antimalware for Windows.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top