Overview Emotet’s automated targeting phishing campaigns have arrived and they are aggressive. As originally discovered and predicted in our previous post about Emotet’s mass email harvesting, computers infected with Emotet and the email harvesting module could be used to create believable emails which even savvy email users may be tricked into clicking. Since then, Kryptos’ Threat Intelligence Team has observed Emotet’s behavior evolve, with the aid of their stolen email troves.
Connect with Kryptos
- Emotet scales use of stolen email content for context-aware phishing, 12 Apr, 2019
- North Korean APT(?) and recent Ryuk Ransomware attacks, 10 Jan, 2019
- Emotet Awakens With New Campaign of Mass Email Exfiltration, 31 Oct, 2018
- Inside Look at Emotet's Global Victims and Malspam Qakbot Payloads, 01 Aug, 2018
- A Brief Look At North Korean Cryptography, 03 Jul, 2018