The internet world is a little safer now after Emotet, the most dangerous malware botnet infrastructure has been disrupted by coordinated work by law enforcement agencies around the world.
Multiple agencies, including the FBI, Europol, and UK’s National Crime Agency, took control of the infrastructure controlling Emotet. It took over two years to finally intercept the botnet, but this international law enforcement operation represents a considerable disruption in cybercriminal operations worldwide after this huge success.
Emotet is a banking trojan that first surfaced in 2014 and evolved into one of the most dangerous malware out there. It spread with automated phishing emails that had infected Microsoft Word documents attached. Once a user opened those documents, the malware opened a backdoor in Windows computers, making them accessible to hackers. The hackers behind the botnet amassed countless infected devices that they were using for all sorts of additional attacks.
“Emotet was our number one threat for a long period and taking this down will have an important impact. Emotet is involved in 30% of malware attacks; a successful takedown will have an important impact on the criminal landscape. […] We expect it will have an impact because we’re removing one of the main droppers in the market – for sure there will be a gap that other criminals will try to fill, but for a bit of time this will have a positive impact for cybersecurity”.Fernando Ruiz, head of operations at Europol’s European Cybercrime Centre
The operation also discovered a database of stolen personal information, including email addresses, usernames, and passwords, stolen by Emotet. People can check if Emotet stole their data by visiting the Dutch National Police website.
Even though the Emotet takedown was successful, the operation is still ongoing. As a defense against this malware and other future ones, authorities recommend using well-established antivirus tools and fully updating their software.
The law enforcement agencies are working with Computer Emergency Response Teams (CERTs) worldwide to assist people affected by this dangerous botnet.
Check the source.
- Users of popular crypto app Maiar are targetted by SMiShingMaiar is a digital crypto wallet and global payments app that allows users to exchange and securely store money […]
- PHOBOS Ransomware Attack Hits Romanian Hospital on July 22A ransomware attack targeted Witting Clinical Hospital in Bucharest. Hackers took control of the healthcare provider’s servers, encrypted the […]
- 740 Ransomware Victims Listed On Data Leak Sites in Q2 2021, New Report ShowsA new report from Digital Shadow highlights the worrying information that the number of ransomware victims named on data […]
- Kaseya Gets Universal Decryptor for REvil RansomwareThe decryptor vendor will work closely with customers affected by this July’s outbreak of ransomware attacks to help recover […]
- Possibly the Highest Ransomware Payment Ever: CNA reportedly paid $40 million to hackersOne of the biggest US insurance companies, CNA, paid a ransom worth $40 million to attackers after a massive […]