An alert for an advanced Emotet banking malware attack that focuses on stealing sensitive information from governments, public and private sectors has been recently issued by the US-Cert team.
Emotet malware is an advanced, modular banking Trojan that mainly functions as a downloader or dropper of other banking Trojans. This expensive and destructive malware affects public and private sectors and state, local, tribal, and territorial (SLTT) governments.
Since 2017, Emotet banking malware has been spreading via malspam (emails containing malicious links or attachments) which uses branding familiar to the recipient. It has also been spread using the MS-ISAC name. Recent campaigns in July 2018 imitate PayPal receipts, shipping notifications, or “past-due” invoices from MS-ISAC. The very first malware infection occurs when the user clicks on or opens the infected PDF, malicious download link, or macro-enabled Microsoft Word document included in the malspam. After the download process, Emotet malware tries to propagate the local networks via incorporated spreader modules.
Emotet is one of the rapidly spreading banking Trojans and could cost almost $1 million to recover the affected networks; malware authors are constantly working to improve persistence. A recent malware campaign delivering Emotet banking malware through Microsoft Office document attachments with “Greeting Card” as the document name, hijacks the Windows API.
Endpoint protection, or endpoint security, is a solution that protects and secures the endpoints from unknown malware or advanced persistent threats or zero-day exploits. Traditional antivirus software cannot be a standalone solution for eradicating the threats, and Xcitium Advanced Endpoint Protection is designed to deliver complete security, guaranteeing data protection for all enterprises.
AEP thus delivers a focused security solution that helps secure servers, workstations, and devices that are connected to access the enterprise networks. Xcitium Advanced Endpoint Protection prevents unknown malware from running on your endpoints with its unique Default Deny Platform™.
See Also: