News/Info Japan, France, New Zealand Warn of Sudden Uptick in Emotet Trojan Attacks

emailx45

Местный
Регистрация
5 Май 2008
Сообщения
3,571
Реакции
2,438
Credits
573
Japan, France, New Zealand Warn of Sudden Uptick in Emotet Trojan Attacks
Ravie Lakshmanan - September 08, 2020
[SHOWTOGROUPS=4,20,22]
Для просмотра ссылки Войди или Зарегистрируйся
Cybersecurity agencies across Asia and Europe have issued multiple security alerts regarding the resurgence of email-based Emotet malware attacks targeting businesses in France, Japan, and New Zealand.

"The emails contain malicious attachments or links that the receiver is encouraged to download," New Zealand's Для просмотра ссылки Войди или Зарегистрируйся (CERT) said. "These links and attachments may look like genuine invoices, financial documents, shipping information, resumes, scanned documents, or information on COVID-19, but they are fake."

Echoing similar concerns, Japan's CERT (JPCERT/CC) cautioned it found a Для просмотра ссылки Войди или Зарегистрируйся in the number of domestic domain (.jp) email addresses that have been infected with the malware and can be misused to send spam emails in an attempt to spread the infection further.

First identified in Для просмотра ссылки Войди или Зарегистрируйся and distributed by a threat group tracked as TA542 (or Mummy Spider), Для просмотра ссылки Войди или Зарегистрируйся has since evolved from its original roots as a simple banking Trojan to a modular "Swiss Army knife" that can serve as a downloader, information stealer, and spambot depending on how it's deployed.

In recent months, the malware strain has been linked to several botnet-driven malspam campaigns and even capable of delivering more dangerous payloads such as Ryuk ransomware by renting its botnet of compromised machines to other malware groups.

The new uptick in Emotet activity coincides with their Для просмотра ссылки Войди или Зарегистрируйся after a prolonged development period that lasted since February 7 earlier this year, with the malware sending as many as Для просмотра ссылки Войди или Зарегистрируйся on all weekdays targeting European organizations.

Для просмотра ссылки Войди или Зарегистрируйся

"Around February 7, Emotet entered a period of time where they stopped spamming and began working on developing their malware," Binary Defence outlined in a Для просмотра ссылки Войди или Зарегистрируйся detailing an exploit (called EmoCrash) to prevent the malware from affecting new systems.

Typically spread via large-scale phishing email campaigns involving malicious Microsoft Word or password-protected ZIP file attachments, the recent wave of attacks have taken advantage of a technique called email thread hijacking, using it to infect devices with the Для просмотра ссылки Войди или Зарегистрируйся and Для просмотра ссылки Войди или Зарегистрируйся banking Trojans.

It works by exfiltrating email conversations and attachments from compromised mailboxes to craft convincing phishing lures that take the form of a malicious response to existing, ongoing email threads between the infected victim and other participants in order to make the emails seem more credible.

"TA542 also constructs phishing emails on the basis of information collected during the compromise of mailboxes, which it sends to exfiltrated contact lists, or more simply spoofs the image of entities, prior victims," the National Cybersecurity Agency of France (Для просмотра ссылки Войди или Зарегистрируйся) said.

Для просмотра ссылки Войди или Зарегистрируйся

In addition to using JPCERT/CC's Для просмотра ссылки Войди или Зарегистрируйся to detect the Emotet trojan's presence on a Windows machine, it's recommended that network logs are routinely scanned for any connection to known Emotet Для просмотра ссылки Войди или Зарегистрируйся (C2) infrastructure.

"Since returning from an extended vacation, TA542 email campaigns are once again the most prevalent by message volume by a large margin, with only a few other actors coming close," Proofpoint said in an Для просмотра ссылки Войди или Зарегистрируйся of Emotet last month.

"They have introduced code changes to their malware, such as updates to the email sending module, and picked up a new affiliate payload to distribute (Qbot), [and] expanded targeting of countries using native language lures."
[/SHOWTOGROUPS]