Emotet Returns

November 22, 2021

Emails from a newly-revived Emotet botnet have one of three types of attachments: Microsoft Excel spreadsheet Microsoft Word document Password-protected zip archive (password: BMIIVYHZ) containing a Word document These emails were all spoofed replies that used data from stolen email chains, presumably gathered from previously infected Windows hosts. Infection traffic for Emotet is similar to what we saw before the takedown in January 2021. The only real difference is Emotet post-infection C2 is now encrypted HTTPS instead of unencrypted HTTP.
Subscribe