Skip to main content

Kaspersky finds Emotet’s activity grows three-fold in just one month

April 13, 2022

Woburn, MA — April 13, 2022 – According to Kaspersky telemetry, Emotet, a botnet coined “the most dangerous malware in the world” by Europol, showed worldwide growth of over 200% in March 2022. This indicates that the threat actors behind the botnet have been taking steps to significantly increase their malicious activity for the first time since its comeback in November 2021.

Emotet is both a botnet, a controlled network of infected devices used for attacks on other devices, and malware that is capable of extracting different kinds of data, often pertaining to finance, from infected devices. Operated by experienced threat actors, it has become one of the biggest players in the cybercrime world. Emotet was shut down following a joint effort from various law enforcement agencies in January 2021. However, in November 2021, the botnet returned and has been gradually increasing its activity since, first by spreading via Trickbot, a different bot network, and now by itself via the means of malicious spam campaigns.

Kaspersky telemetry shows that the number of victims increased from 2,843 in February 2022 to 9,086 in March, attacking over three times the number of users. The number of attacks detected by Kaspersky solutions has grown from 16,897 in February 2022 to 48,597 in March.

A typical Emotet infection begins with spam emails that contain Microsoft Office attachments with a malicious macro. Using this macro, the actor can start a malicious PowerShell command to drop and start a module loader, which can then communicate with a command and control sever to download and start modules. These modules can perform a variety of different tasks on the infected device. Kaspersky researchers were able to retrieve and analyze 10 out of 16 modules, with most having been used by Emotet in the past in one form or another.

The current version of Emotet can create automated spam campaigns that are further spread down the network from the infected devices. It is able to then extract emails and email addresses from Thunderbird and Outlook applications and collecting passwords from popular web browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, Safari and Opera, to gather the account details of various email clients.

“Emotet was a highly advanced network that haunted many organizations around the world. Its takedown was a significant step towards decreasing threats worldwide by helping to tear apart their network and removing it from the top threat list for over a year. While the number of attacks is not comparable to the previous scale of Emotet’s operations, the change in dynamics points to a significant activation of the botnet’s operators and a high likelihood of this threat spreading further in the coming months,’ comments Alexey Shulmin, security researcher at Kaspersky.

Learn more about Emotet modules on Securelist.com, or watch the documentary about Emotet’s takedown on Tomorrow Unlocked.

To help businesses stay protected from Emotet and similar botnets, experts suggest organizations take the following measures as soon as possible:

  • Keep up to date. Check for further developments regarding Emotet. There are several ways to do this, such as visiting the Kaspersky Resource Center or conducting your own research.
  • Do not download dubious attachments from spam emails or click on suspicious links. If you're unsure whether an email is fake, avoid risks and contact the sender. If you are asked to allow a macro to run on a downloaded file, do not do so under any circumstances and delete the file immediately. This way you will not give Emotet a chance to get on your computer.
  • Use online banking with multifactor authentication solutions.
  • Be sure to install a full virus and malware protection program, such as Kaspersky Internet Security, and have it scan your computer regularly for any vulnerabilities. This will give you the best possible protection against the latest viruses, spyware etc.
  • Make sure your software is updated – including your operating system and any software applications, (attackers exploit loopholes in widely used programs to gain entry).
  • Invest in regular cybersecurity awareness training for employees to educate them on best practices, such as not clicking on links or opening attachments received from untrusted sources. Follow this up with a simulated phishing attack to ensure they know how to distinguish phishing emails.

About Kaspersky

Kaspersky is a global cybersecurity company founded in 1997. Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky technologies and we help 240,000 corporate clients protect what matters most to them. Learn more at usa.kaspersky.com.

Media Contact:

Cassandra Faro

Cassandra.Faro@Kaspersky.com

781-503-1812

 

Kaspersky finds Emotet’s activity grows three-fold in just one month

Kaspersky logo

About Kaspersky

Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection, specialized security products and services, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help over 200,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.

Related Articles Press Releases