Sign in
  • News
  • Interviews
  • Articles
  • Podcasts
  • Insights
    • Future Ready
    • Guest Post
    • Use Cases
    • Events
  • Quick Bytes
  • RESOURCES
Sign in
Welcome!Log into your account
Forgot your password?
Privacy Policy
Password recovery
Recover your password
Search
Thursday, February 9, 2023
  • Sign in / Join
Sign in
Welcome! Log into your account
Forgot your password? Get help
Privacy Policy
Password recovery
Recover your password
A password will be e-mailed to you.
ITSECURITYWIRE FAVCON ITSECURITYWIRE FAVCON ITSecurityWire
  • News
  • Interviews
  • Articles
  • Podcasts
  • Insights
    • Future Ready
    • Guest Post
    • Use Cases
    • Events
  • Quick Bytes
  • RESOURCES
Home Quick Bytes Fake Windows bait used in Emotet attacks
  • Quick Bytes

Fake Windows bait used in Emotet attacks

By
ITsec Bureau
-
October 16, 2020
44
Emotet attacks

The largest source of malspam, Emotet botnet, is known to regularly change the email delivery route, file attachment content, and file attachment style to avoid detection. Misleading the users is an important part of the tactics and the malware, botnet’s back-end infrastructure, or email template. The majority of Emotet tactics include booby-traps like Office documents that mislead users to select the” Enable Editing” option.

Read More: Artificial Intelligence on Modern Enterprise – Trends to Consider

In the latest tactic launched after a short hiatus, attachments sent via the Emotet campaigns prompt the users with fake Windows Update notifications. The update requires the selection of the “Enable Editing” button. This tactic has already spammed a large number of users.

Source: zdnet

  • TAGS
  • Emotet attacks
  • Fake Windows update
  • malspam. Email attachment
Previous articleNew Edge extensions API rolled out by Microsoft, ad blockers to be left alone
Next articleCHERI architecture may reduce the number of security updates released
ITsec Bureau
https://itsecuritywire.com/

RELATED ARTICLESMORE FROM AUTHOR

OpenSSL releases a patch for critical flaws

Actively Exploited GoAnywhere MFT Zero-Day Patched

Actively Exploited GoAnywhere MFT Zero-Day Patched

Twenty Million Users Affected by Data Breach at Instant Checkmate, According to Truth Finder

Twenty Million Users Affected by Data Breach at Instant Checkmate, According to Truth Finder

Latest posts

DataVisor Selects Equifax as Primary Consumer Identity Data Partner

DataVisor Selects Equifax as Primary Consumer Identity Data Partner

October 28, 2021
Traceable AI Offers Free Solution To Stop Log4j Attacks-01

Traceable AI Offers Free Solution To Stop Log4j Attacks

February 11, 2022
Open-Line

Open Line Chooses and Deploys Salt Security API Protection Platform to Enhance Their Managed Services...

December 8, 2022
Eighteen Azure AD Apps

Eighteen Azure AD apps removed by Microsoft

September 25, 2020
How Long will VPNs be Discontinued-01

How Long will VPNs be Discontinued?

January 13, 2022


An invaluable resource for all your IT security initiatives and assets.

Knowledge sharing platform for all IT security needs and plans. Peer to peer conversations that leverage industry experts and leaders for ideas, opinions and business insights.

Media@ITSecurityWire.com
Sales@ITSecurityWire.com

Recent Posts

  • Major Attempts to Improve Cybersecurity Workforce Across Organizations
  • Cloud Security Threats & Proven Strategies to Mitigate Them: 2023 Edition
  • OpenSSL releases a patch for critical flaws
  • Actively Exploited GoAnywhere MFT Zero-Day Patched
  • Baffle Makes Multi-Tenant Data Security for SaaS Providers Even Easier

Visit Our Other Publication

Quick Links

  • About Us
  • News
  • Featured Articles
  • Featured Interview
  • Guest Post
  • Privacy Policy
  • Do Not Sell My Information
  • About Us
  • News
  • Featured Articles
  • Featured Interview
  • Guest Post
  • Privacy Policy
  • Do Not Sell My Information
An Imprint of OnDot ® Media © | All rights reserved | Privacy Policy