The Emotet banking Trojan has been around since 2014. It continues to evolve, and has even been spotted acting like a distribution method for other banking malware.
In September, Emotet staged another big comeback fuelled, in part, by new propagation methods implemented in the newest variants. It can now also spread through networks by brute forcing Active Directory domain accounts with a dictionary attack and by using the EternalBlue exploit / DoublePulsar backdoor combo.
Leave a reply