History of Emotet
First identified in 2014, Emotet continues to infect systems and hurt users to this day, which is why we’re still talking about it,
unlike other trends from 2014 (Ice Bucket Challenge anyone?).
Version one of Emotet was designed to steal bank account details by intercepting internet traffic. A short time after, a new version
of the software was detected. This version, dubbed Emotet version two, came packaged with several modules, including a money transfer
system, malspam module, and a banking module that targeted German and Austrian banks.
By January of 2015, a new version of Emotet appeared on the scene. Version three contained stealth modifications designed to keep the
malware flying under the radar and added new Swiss banking targets.
Fast forward to 2018—new versions of the Emotet Trojan include the ability to install other malware to infected machines. This malware
may include other Trojans and ransomware. Case in point, a July 2019 Emotet strike on Lake City, Florida cost the town $460,000 in ransomware
payouts, according to Gizmodo. An analysis of the strike found Emotet served only as the initial infection vector. Once infected, Emotet downloaded
another banking Trojan known as TrickBot and the Ryuk ransomware.
After going relatively quiet for most of 2019, Emotet came back strong. In September of 2019, Malwarebytes Labs reported on a botnet-driven
spam campaign targeting German, Polish, Italian, and English victims with craftily worded subject lines like “Payment Remittance Advice” and
“Overdue invoice.” Opening the infected Microsoft Word document initiates a macro, which in turn downloads Emotet from compromised WordPress sites.
|