{"id":5812,"date":"2021-11-15T23:28:42","date_gmt":"2021-11-15T14:28:42","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=5812"},"modified":"2021-12-13T23:36:39","modified_gmt":"2021-12-13T14:36:39","slug":"cyber-security-research-groups-observe-signs-of-emotet-malware-returning-and-rebuilding-its-botnet-via-trickbot","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/cyber-security-research-groups-observe-signs-of-emotet-malware-returning-and-rebuilding-its-botnet-via-trickbot\/","title":{"rendered":"Cyber security research groups observe signs of Emotet malware returning and rebuilding its botnet via TrickBot"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5812\" class=\"elementor elementor-5812\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-de99987 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"de99987\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b20c00\" data-id=\"1b20c00\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9fef20b elementor-widget elementor-widget-text-editor\" data-id=\"9fef20b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>On Monday 15<sup>th<\/sup> of November\u00a02021, Emotet research groups Cryptolaemus, GData, and Advanced Intel started to observe the TrickBot malware dropping a loader for Emotet on infected devices. The Emotet malware was considered the most widely spread malware in the past although at the start of the year, it was taken down by an international law enforcement action coordinated by Europol and Eurojust. But now there are signs that a new variant of Emotet is being distributed through the Trickbot malware.<\/p><p>Emotet was being used to infected devices to conduct spam campaigns and install other payloads like Qbot and Trickbot malware. These payloads are known to be used by threat actors who are looking to deploy ransomware. This is concerning to cyber security researchers as the rebuilding of the Emotet botnet could lead to an increase in ransomware attacks. The botnet seems to be rebuilding itself through the infrastructure of Trickbot.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On Monday 15th of November&nbsp;2021, Emotet research groups Cryptolaemus, GData, and Advanced Intel started to observe the TrickBot malware dropping a loader for Emotet on infected devices. The Emotet malware was considered the most widely spread malware in the past although at the start of the year, it was taken down by an international law enforcement action coordinated by Europol<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":5817,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,12,2,8,1],"tags":[],"class_list":["post-5812","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_news","category-read_article","category-ce_news","category-industry_sector","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/12\/Picture1-18.jpg?fit=1377%2C994&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/5812"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=5812"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/5812\/revisions"}],"predecessor-version":[{"id":5820,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/5812\/revisions\/5820"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/5817"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=5812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=5812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=5812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}