Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 18 submissions in the queue.
posted by Fnord666 on Sunday July 19 2020, @11:19AM   Printer-friendly
from the absence-makes-the-bot-go-wander dept.

Emotet botnet surges back after months of absence:

The notorious Emotet went into the dark since February 2020, but now has surged back with a new massive spam campaign targeting users worldwide.

[...] "Today, Emotet suddenly surged back to life with reply-chain, shipping, payment, and invoice spam that deliver malicious Word documents spreadsheets." states BleepingComputer.

Malware researchers Joseph Roosen confirmed that limited activity associate with the botnet was observed earlier this week, botnet operators were using weaponized documents employing old URLs.

Roosen added that the Emotet botnet is now spewing forth massive amounts of spam employing new URLs pointing to compromised WordPress sites.

[...] Researchers from Cryptolaemus, a group of experts focused on analyzing Emotet, also confirmed Emotet's resurrection. Other research groups also observed a surge back of the botnet


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 4, Touché) by Gaaark on Sunday July 19 2020, @01:16PM (3 children)

    by Gaaark (41) on Sunday July 19 2020, @01:16PM (#1023709) Journal

    Windows users scream.

    Except I DON'T scream because I don't use Windows.

    Man...just dump that shit.

    --
    --- Please remind me if I haven't been civil to you: I'm channeling MDC. ---Gaaark 2.0 ---
    Starting Score:    1  point
    Moderation   +2  
       Touché=2, Total=2
    Extra 'Touché' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   4  
  • (Score: 0) by Anonymous Coward on Sunday July 19 2020, @01:30PM (2 children)

    by Anonymous Coward on Sunday July 19 2020, @01:30PM (#1023715)

    Yeah, I really don't understand the security theatre behind Windows Defender.

    Wouldn't it be easier for the company that develops Windows to close the gaping security holes in the OS rather than guard against 'malicious' software via virus scanning?

      In fairness, UWP through the Windows S store was supposed to sandbox apps to avoid bad actors.

    • (Score: 0) by Anonymous Coward on Sunday July 19 2020, @03:18PM

      by Anonymous Coward on Sunday July 19 2020, @03:18PM (#1023741)

      Windows Depends (tm) will take care of all those data leaks.

    • (Score: 2) by RS3 on Monday July 20 2020, @04:05AM

      by RS3 (6367) on Monday July 20 2020, @04:05AM (#1023969)

      You make great points, but somehow your use of "Windows" and "sandbox" in the same sentence struck me funny. Something about Billy G. and bulldozers and dumptrucks in the backyard...

      Wouldn't it be easier for the company that develops Windows to close the gaping security holes in the OS rather than guard against 'malicious' software via virus scanning?

      When you have people buying your essentially monopoly product, you don't make even more money fixing things- you sell "training" and certificates and upgrades and "support" and keep them coming for more.

      Now I feel ill...