Emotet Botnet Is Back, Servers Active Across the World

Command and control (C2) servers for the Emotet botnet appear to have resumed activity and deliver binaries once more. This comes after being inert since the beginning of June.


Although it started as a banking trojan in 2014, Emotet changed its course to becoming a botnet that delivers various malware strains.

Emotet is now one of the top threats, its infrastructure being used to distribute Trickbot, another banking trojan, and then spread the Ryuk ransomware. This combination is dubbed ‘triple threat’ and has affected public administrations in the U.S.

Emotet break is over

Researchers noticed that Emotet operators took a break at the beginning of June and correctly assumed that it would not be for long. No new campaigns were observed since then, and the general consensus in the infosec community was that the servers were down for maintenance.

A list of servers seen to be active is available here and at the end of the article, seen online by Black Lotus Labs on August 22. Malware analysts are already tracking them.

According to MaxMind geo-IP service, the addresses are from the U.S., Hungary, France, Germany, India, Belgium, Poland, Mexico, Argentina, and Australia.


bleepingcomputer.com
Orginal: (https://www.bleepingcomputer.com/news/security/emotet-botnet-is-back-servers-active-across-the-world/)

More about Emotet

https://www.csoonline.com/article/3387146/what-is-emotet-and-how-to-guard-against-this-persistent-trojan-malware.html

Contact

 Brandenburgische Str. 25
 10707 Berlin, Germany
 +49 30 551 25 188
 +49 30 915 03 934
 mail@snoke-connect.com