‘Emotet’ botnet bounces back after Interpol actions

Share on facebook
Share on twitter
Share on linkedin
Share on reddit
Share on email

The so-called Emotet malware is re-distributed after infections with the TrickBot malware. Several leading security researchers indicate that malicious parties want to use this to restore the Emotet botnet. Last spring, Europol and the German authorities took over the botnet and used the infrastructure to remove the malware from all infected computers.

Security researchers at Cryptolaemus, GData and Advanced Intel have recently noticed that criminals are using computers infected with Trickbot to re-roll the Emotet malware and restore the infamous botnet of the same name.

Fix botnet

With this malware, all infected computers form a bot network; a group of computers that allows criminals to attack networks, send spam undetected or install even more complex malware. Botnets can consist of millions of computers, and the attack and spam campaigns that can be carried out with these botnets have profound consequences for businesses, services and consumers.

Until recently, the Emotet malware was one of the most widespread malware in the world. In January 2021, the infrastructure behind the botnet was taken over

Read the article