DoublePulsar

Cybersecurity from the trenches, written by Kevin Beaumont. Opinions are of the author alone, not their employer.

Follow publication

Emotet being hijacked by another actor

Kevin Beaumont
DoublePulsar
Published in
2 min readJul 24, 2020

--

Emotet is a malware distribution system, which has been involved in multiple human operated ransomware campaigns (for example, Ryuk). It’s a pretty common point of entry for threat actors. I’ve flagged a few times over the years, the last time in 2019, that Emotet uses an insecure malware distribution system.

They use various different webshells and techniques to update their malware— both Word documents and payload exes. They use largely hacked infrastructure (for example, Wordpress sites) to distribute their wares.

Their passwords and techniques for this are known. The net impact is anybody can replace their payloads.

Emotet returned last week, sending millions of emails. This week, somebody has started replacing the Emotet distribution files with animated GIFs.

excuse me
excuse me
what the fork
picture of ivan
harry potter

My first thought was they were just serving different content to web requests with .htaccess, however from running actual Emotet emails, they were broke too. Emotet is under attack.

Here’s a video from BleepingComputer where you can see the impact — Emotet’s attacks fails to execute:

--

--

Published in DoublePulsar

Cybersecurity from the trenches, written by Kevin Beaumont. Opinions are of the author alone, not their employer.

Written by Kevin Beaumont

Everything here is my personal work and opinions.

No responses yet

Write a response