Good news ! Hackbusters community is waiting for you !  https://discuss.hackbusters.com
KnowBe4 has been running the HackBusters site for a few years now, providing you with trending IT security news. We are expanding it and have launched a new exciting online community! The forum is divided into four main topics or categories: Social Engineering, Ransomware, Phishing and Security Awareness Training. You are invited to be one of the first to join us at: https://discuss.hackbusters.com.

Emotet Malware Returns to Work After Holiday Break

Emotet-malware-returns-to-work-after-holiday-slump-showcase_image-8-a-11955

Anti-Malware , Cybercrime , Fraud

Emotet Malware Returns to Work After Holiday Break Fallout Exploit Kit Has Also Reappeared, Distributing GandCrab Ransomware Mathew J. Schwartz (euroinfosec) • January 18, 2019 Spam email with an attached Microsoft Word document that contains a malicious macro designed to download and execute Emotet malware. (Source: Brad Duncan)

Malware developers as well as their customers or subscribers often appear to take a vacation around the Christmas and New Year holidays, and last month was no exception.

See Also: Live Webinar | Sunset of Windows Server 2008: Migrate with Docker

Following a December 2018 slowdown or hiatus, however, attacks involving Emotet - aka Feodo, Hancitor - aka Chanitor and Tordal, and Trickbot have resurged, reports Brad Duncan (@malware_traffic), a threat intelligence analyst for the Unit 42 research group at Palo Alto Networks, in a blog post for the SANS Institute Internet Storm Center.

Duncan says that among...(continued)

View All Trending Stories