SecuMail-Blog

Emotet with new distribution channel

An old acquaintance uses a new method to spread his malware.

SecuMail treats downloads like attachments and protects effectively.

 

Most dangerous malware of the year now uses download links to spread.

This year, the Emotet malware has massively infected many well-known companies and public institutions and caused considerable damage.

So far, Emotet has spread via Office files in the email attachment. These are increasingly detected by email filters.

To avoid this, the malware now infects its victims via a download link. This has several advantages for the malware makers:

  • The malware is not part of the e-mail and therefore more difficult to detect by email filters.

  • Once the file is on the PC, only the virus scanner can help. However, they react far too slowly for email campaigns.

Deceptively real

To appear more credible, Emotet uses Outlook harvesting, the evaluation of Outlook data from hijacked computers. If a computer is successfully infected, the address book, email history and signatures are downloaded and used to send deceptively real emails to a new victim.

The malware emails are therefore extremely similar to previous, legitimate emails in terms of content, which increases the likelihood of a fatal mistake – clicking on the download. The example of an Emotet e-mail shown in the image shows a real “hijacked” e-mail correspondence that has been provided with a malicious link.

 

SecuMail examines downloads

With SecuMail, selected links are examined, downloaded and examined together with the e-mail. This means that the files that are hidden behind links and can therefore be opened with just one click are subject to the same e-mail policy as the attachments. If the download then contains macros or executable code, the entire email will be blocked.

SecuMail has been protecting against this new variant for a long time without having to install an update. In addition, SecuMail generally recommends training employees accordingly (awareness training) in order to further increase security.

 

Update 20.12.2019: Now also with password-encrypted ZIP archive

Just in time for the start of the Christmas holidays, the Emotet makers are going one better: The malware is now also hiding in password-encrypted ZIP archives. These e-mails are also deceptively real with original signatures and quoted original e-mails.

We have activated the feature “Prohibit password-encrypted archives” for all customers – even if you had turned it off in the past. The threat level is too high to allow these attachments. The recipients are informed about the withheld mails and can have them forwarded via support – even on holidays.

 

GDPR Cookie Consent with Real Cookie Banner