{"id":71757,"date":"2022-05-10T14:54:39","date_gmt":"2022-05-10T21:54:39","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=71757"},"modified":"2022-05-13T12:44:38","modified_gmt":"2022-05-13T19:44:38","slug":"emotet-the-return-of-the-worlds-most-dangerous-malware","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/","title":{"rendered":"Emotet: The Return of the World&#8217;s Most Dangerous Malware"},"content":{"rendered":"<p>In our <a href=\"\/resources\/emotet-threat-briefing\/\">new threat briefing report<\/a>, Forescout\u2019s Vedere Labs analyzes an Emotet <a href=\"https:\/\/bazaar.abuse.ch\/sample\/cd3d8e58042c7d2b45a1f4bdf1cacc1f62355d3cb4c6ec9de80a1a34d64dafcb\/\">sample<\/a>, presents a list of IoCs extracted from the analysis and discusses mitigation.<\/p>\n<p><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.emotet\">Emotet<\/a> is the name of both a cybercrime group and a malware loader it distributes. The group is also known as <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-110a\">MUMMY SPIDER<\/a>, while the malware is also known as Geodo or Heodo. According to CISA, <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/TA18-201A\">Emotet is among the most costly and destructive malware<\/a> used against the private and public sectors, with individual incidents costing up to $1 million to remediate. According to Europol, Emotet is the world\u2019s <a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/world%E2%80%99s-most-dangerous-malware-emotet-disrupted-through-global-action\">most dangerous malware<\/a>.<\/p>\n<p>The malware is disseminated through malicious emails that typically have a financial theme, such as receipts and invoices, or follow <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/bad-actors-capitalize-current-events-email-scams\">current events<\/a>, such as tax season scams and donation requests for refugees. Infection happens when a victim opens a document attached to the email that contains malicious macros that, in turn, execute the malware downloader. After download, Emotet persists on the infected machine, communicates with a C2 server to receive instructions and attempts to spread on the local network.<\/p>\n<p>Emotet started in 2014 as a banking trojan used to steal credentials, but it has evolved through <a href=\"https:\/\/securelist.com\/the-chronicles-of-emotet\/99660\/\">several mutations<\/a> and <a href=\"https:\/\/securelist.com\/emotet-modules-and-recent-attacks\/106290\/\">additional DLL modules<\/a> to become a botnet capable of delivering other malware, such as TrickBot or IcedID, and ransomware, such as Ryuk. This capability is so important that Emotet is often considered \u201cinfrastructure as a service\u201d for initial access and malware distribution.<\/p>\n<p>The botnet was taken down by <a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/world%E2%80%99s-most-dangerous-malware-emotet-disrupted-through-global-action\">police action in January 2021<\/a>, but the threat actor rebuilt its infrastructure and returned in November 2021. Emotet started adding more bots around January, and the number has been increasing steadily. At its previous peak before the police action, Emotet infected millions of devices. Since its resurgence, there are <a href=\"https:\/\/blog.lumen.com\/emotet-redux\/\">now approximately 130,000 bots<\/a>, which can propagate the malware by spamming targets, be used for lateral movement in targeted organizations or be promoted to proxy C2 servers. The number of Emotet infections <a href=\"https:\/\/securelist.com\/emotet-modules-and-recent-attacks\/106290\/\">tripled in March 2022<\/a> over the previous month.<\/p>\n<p>Forescout recommends that organizations use the following steps to mitigate risks:<\/p>\n<ul>\n<li>Enforce anti-phishing training to avoid the initial infection via malspam<\/li>\n<li>Disable macro execution whenever possible<\/li>\n<li>Monitor the use of regsvr32 processes on endpoints as detailed in the technical report<\/li>\n<li>Deploy the IoCs shared in the technical report in network detection and threat hunting tools<\/li>\n<\/ul>\n<p>For more information and technical analysis, read the full report.<\/p>\n<a href=\"\/resources\/emotet-threat-briefing\/\"  title=\"Download the Briefing Note\" class=\"c-btn c-btn--primary icon-position-right\" target=\"new\"><span class=\"cta-button-text\">Download the Briefing Note<\/span><\/a>\n","protected":false},"excerpt":{"rendered":"<p>In our new threat briefing report, Forescout\u2019s Vedere Labs analyzes an Emotet sample, presents a list of IoCs extracted from the analysis and discusses mitigation. Emotet is the name of both a cybercrime group and a malware loader it distributes. The group is also known as MUMMY SPIDER, while the malware is also known as [&hellip;]<\/p>\n","protected":false},"author":124,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[542],"class_list":["post-71757","post","type-post","status-publish","format-standard","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emotet: The Return of the World&#039;s Most Dangerous Malware - Forescout<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emotet - The Return of the World&#039;s Most Dangerous Malware\" \/>\n<meta property=\"og:description\" content=\"Forescout Vedere Labs Threat Briefing\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-10T21:54:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-13T19:44:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/05\/FS-2022-Threat-Briefing-Share-Image-Emotet-536x280-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"536\" \/>\n\t<meta property=\"og:image:height\" content=\"281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Forescout Research - Vedere Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Emotet - The Return of the World&#039;s Most Dangerous Malware\" \/>\n<meta name=\"twitter:description\" content=\"Forescout Vedere Labs Threat Briefing\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/05\/FS-2022-Threat-Briefing-Share-Image-Emotet-Twitter.png\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/\"},\"author\":{\"name\":\"Forescout Research - Vedere Labs\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\"},\"headline\":\"Emotet: The Return of the World&#8217;s Most Dangerous Malware\",\"datePublished\":\"2022-05-10T21:54:39+00:00\",\"dateModified\":\"2022-05-13T19:44:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/\"},\"wordCount\":420,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/\",\"name\":\"Emotet: The Return of the World's Most Dangerous Malware - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"datePublished\":\"2022-05-10T21:54:39+00:00\",\"dateModified\":\"2022-05-13T19:44:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emotet: The Return of the World&#8217;s Most Dangerous Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\",\"name\":\"Forescout Research - Vedere Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"caption\":\"Forescout Research - Vedere Labs\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emotet: The Return of the World's Most Dangerous Malware - Forescout","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/","og_locale":"en_US","og_type":"article","og_title":"Emotet - The Return of the World's Most Dangerous Malware","og_description":"Forescout Vedere Labs Threat Briefing","og_url":"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2022-05-10T21:54:39+00:00","article_modified_time":"2022-05-13T19:44:38+00:00","og_image":[{"width":536,"height":281,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/05\/FS-2022-Threat-Briefing-Share-Image-Emotet-536x280-1.png","type":"image\/png"}],"author":"Forescout Research - Vedere Labs","twitter_card":"summary_large_image","twitter_title":"Emotet - The Return of the World's Most Dangerous Malware","twitter_description":"Forescout Vedere Labs Threat Briefing","twitter_image":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/05\/FS-2022-Threat-Briefing-Share-Image-Emotet-Twitter.png","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/"},"author":{"name":"Forescout Research - Vedere Labs","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984"},"headline":"Emotet: The Return of the World&#8217;s Most Dangerous Malware","datePublished":"2022-05-10T21:54:39+00:00","dateModified":"2022-05-13T19:44:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/"},"wordCount":420,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/","url":"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/","name":"Emotet: The Return of the World's Most Dangerous Malware - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"datePublished":"2022-05-10T21:54:39+00:00","dateModified":"2022-05-13T19:44:38+00:00","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/emotet-the-return-of-the-worlds-most-dangerous-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Emotet: The Return of the World&#8217;s Most Dangerous Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984","name":"Forescout Research - Vedere Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781","url":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","caption":"Forescout Research - Vedere Labs"}}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/71757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/124"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=71757"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/71757\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=71757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=71757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=71757"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=71757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}