Crooks always attempt to monetize the media interest on specific topics, and the recent Greta Thunberg-themed Emotet campaign confirms it.
Experts from the Proofpoint Threat Insight team have spotted a malspam campaign delivering the Emotet malware using the Swedish activist Greta Thunberg as a lure.
The experts observed a global malicious spam campaign that leveraged a number of topical lures in a single message, it combines the following four elements:
The spam messages come with an attached Microsoft Word document named “Support Greta Thunberg.doc”. When the recipient opens the message, the Emotet Trojan is installed.
“These attacks are not only global in their targeting but also in their use of native-language lures. Our researchers have seen malicious emails with subject lines in Spanish, Italian, French and Polish. You can find examples of the lures and subject lines we’ve seen in these languages as well as English at the end of this blog.” reads the analysis published by Proofpoint.
Proofpoint researchers have observed spam messages sent at email addresses in the .com and .edu domains, as well as domains associated with specific countries, including Australia, Austria, Canada, European Union, Germany, Italy, Japan, Singapore, Switzerland, United Arab Emirates, and the U.K.
The messages also used geo-localized subject lines and samples, for example, the messages sent to Italian recipient have the following subjects:
“Attackers choose their lures carefully: in many ways their lures are a reliable barometer of public interest and awareness,” Proofpoint concludes.
A few days ago, Germany’s federal cybersecurity agency BSI warned of an active malspam campaign that aims at distributing the Emotet banking Trojan.
The malicious messages camouflaged to look like messages delivered by German federal authorities. According to the BSI, attackers have already infected with the Emotet banking Trojan several of federal administration authorities.
The Emotet banking trojan has been active at least since 2014, the botnet is operated by a threat actor tracked as TA542.
In 2019, security experts haven’t detected any activity associated with Emotet since early April, when researchers at Trend Micro have uncovered a malware campaign distributing a new Emotet Trojan variant that compromises devices and uses them as Proxy C2 servers.
Emotet re-appeared on the threat landscape in August 2019, with an active spam distribution campaign. At the time, Malwarebytes observed the Trojan started pumping out spam, spam messages initially targeted users in Germany, Poland and Italy, and also the US. The campaign continues targeting users in Austria, Switzerland, Spain, the United Kingdom, and the United States.
The researchers observed hundreds of thousands of messages were sent as part of this distribution effort.
In November, the Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) warned businesses and netizens of Emotet and BlueKeep attacks in the wild.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Emotet, malware)
[adrotate banner=”5″]
[adrotate banner=”13″]
Cisco warns customers of password-spraying attacks that have been targeting Remote Access VPN (RAVPN) services…
Hot Topic suffered credential stuffing attacks that exposed customers' personal information and partial payment data.…
Cisco addressed multiple vulnerabilities in IOS and IOS XE software that can be exploited to…
Google's Threat Analysis Group (TAG) and Mandiant reported a surge in the number of actively…
Google addressed two zero-day vulnerabilities in the Chrome web browser that have been demonstrated during…
The INC Ransom extortion group hacked the National Health Service (NHS) of Scotland and is threatening…
This website uses cookies.