The Emotet botnet earned the title of “most wanted” malware family for the month of July 2020 following a period of inactivity.
Check Point revealed that Emotet threat activity had affected 5% of organizations worldwide in July 2020, thereby earning the malware the top spot in the security firm’s Global Threat Index for that month.
Emotet launched into these attacks following a five-month hiatus that ended in mid-July, as reported by Bleeping Computer.
It was just a few days after that when Bleeping Computer covered the efforts of someone to disrupt the malware family’s attacks by hacking into its distribution websites and replacing their payloads with memes and GIFs, thereby sparing victims from the brunt of an Emotet infection.
Those efforts didn’t slow down the Emotet gang, however. Later in the month, the malware family’s authors added new functionality that enabled their creation to steal victims’ email attachments and use them in an attempt to prey upon their email contacts.
Check Point observed that these developments highlight the need for organizations to defend against an Emotet infection by taking preventative steps:
… [A]s it is active again, organizations should educate employees about how to identify the types of malspam that carry these threats and warn about the risks of opening email attachments or clicking on links from external sources. Businesses should also look at deploying anti-malware solutions that can prevent such content reaching end-users.
*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/emotet-botnet-named-most-wanted-malware-for-july-2020/