New: Threat Exposure Validation Impact Report 2025
Learn More
Meet the team at Gartner Security & Risk Management Summit
Book a Meeting
Join our Summer Webinar Series on Threat Exposure Validation
Register Now
Meet the team at Infosecurity Europe 2025
Book a Meeting

Emotet Returns

November 22, 2021

Emails from a newly-revived Emotet botnet have one of three types of attachments: Microsoft Excel spreadsheet Microsoft Word document Password-protected zip archive (password: BMIIVYHZ) containing a Word document These emails were all spoofed replies that used data from stolen email chains, presumably gathered from previously infected Windows hosts. Infection traffic for Emotet is similar to what we saw before the takedown in January 2021. The only real difference is Emotet post-infection C2 is now encrypted HTTPS instead of unencrypted HTTP.