{"id":87705,"date":"2019-05-22T11:22:00","date_gmt":"2019-05-22T05:52:00","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=87705"},"modified":"2019-05-22T11:31:40","modified_gmt":"2019-05-22T06:01:40","slug":"what-is-emotet","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/what-is-emotet\/","title":{"rendered":"What is Emotet?"},"content":{"rendered":"<p>Emotet malware was first identified in 2014 as Banking trojan. Emotet has evolved from banking trojan to threat distributor till now. It has hit many organizations very badly in 2018 with its functionalities like spamming and spreading. Further with its widespread rich\/existence at many organizations, it became threat distributor. Since mid of 2018, Emotet is used by threat actors to spread other malwares like TrickBot, Qakbot and most dangerous Ryuk ransomware. It has also been observed that it loads modules and launches different malware depending on geographical location i.e. Country of Victim.<\/p>\n<p>Malware authors strategy is to use infected systems for all means like firstly for credential stealing, further use these credentials for spreading and spamming. Finally, when all use of this infected system is done, it deploys other malwares like Ransomware, TrickBot, Qakbot.<\/p>\n<p>From mid of 2018, Emotet has become headache for security providers because of its polymorphic, self-updating and spreading capabilities which makes cleaning of such infected network very complex and sometimes takes months for cleaning.<\/p>\n<p><strong>How it can enter into your system?<\/strong><\/p>\n<p>It enters into your system by phishing mail as shown in below fig:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-87699 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/05\/shipment-details-300x189.png\" alt=\"\" width=\"365\" height=\"230\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/05\/shipment-details-300x189.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/05\/shipment-details-619x390.png 619w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/05\/shipment-details.png 683w\" sizes=\"(max-width: 365px) 100vw, 365px\" \/><\/p>\n<p>Such emails contain malicious attachments like doc, pdf, xls, js, etc. Once user opens such attachment, it will download and launch Emotet. Sometimes such mail may contain malicious links, when opened by users, it downloads and launches Emotet. Other way is through lateral spreading i.e. if one of your friend or colleagues in the same network is infected with Emotet, then your friends\u2019 machine can deploy Emotet on your machine.<\/p>\n<p><strong>What Emotet can do?<\/strong><\/p>\n<p>It has many capabilities like password stealing, Email Harvesting, spamming, lateral spreading, launching other malwares. All of these are discussed in detail in our <a href=\"https:\/\/quickheal.co.in\/documents\/technical-paper\/Whitepaper_HowToPM.pdf\">research paper on EMOTET<\/a>.<\/p>\n<p><strong>Impact:<\/strong><\/p>\n<p>According to US-CERT alert released on July 20, 2018, &#8220;Emotet continues to be amongst the most costly and destructive malware affecting state, local, tribal, and territorial (SLTT) governments, and the private and public sectors. Emotet infections have cost SLTT governments up to $1 million per incident to remediate.&#8221;<\/p>\n<p>At Quick-Heal labs, we have seen many of our customers are badly affected because of spamming done by emotet. As malware sends many phishing mails to user\u2019s contacts, mail server reaches its maximum limits and blocks user\u2019s account for the day. As a result, most of the employees of such infected organization cannot send mails. Such blockages lead to disruption to regular operations or work and further potential harm to an organization\u2019s reputation. Finally, after a week or two we were able to totally clean total network.<\/p>\n<p>Ryuk ransomware infection may cause temporary or permanent loss of user\u2019s critical data.<\/p>\n<p>What Quick-Heal&#8217;s Telemetry says:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-87700 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/05\/Per-day-hit-300x186.png\" alt=\"\" width=\"355\" height=\"220\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/05\/Per-day-hit-300x186.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/05\/Per-day-hit-768x476.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/05\/Per-day-hit-629x390.png 629w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/05\/Per-day-hit-789x489.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/05\/Per-day-hit.png 915w\" sizes=\"(max-width: 355px) 100vw, 355px\" \/><\/p>\n<p>As you can see, number of hits per day are very high from July 2018 till April 19. It indicates how widespread it is. But same is not the case with actual numbers of customer escalations. At quick-heal Labs, even after detecting thousands of samples per day, we received many customer escalations in initial months after outbreak. Further, we added some rules, IOC&#8217;s, signatures at each level of Product features namely at Virus Protection, Behavior Detection, Email Protection, Memory scan, IDS &amp; IPS, Machine learning based, Browsing protection. This directly affected in Zero customer escalations for Emotet from last few months with already infected customers also totally cleaned. As stats are indicating that we are detecting thousands of Emotet samples per day in last few months and still NO customer escalation\/issue reported.<\/p>\n<p><strong>How can I remove Emotet?<\/strong><\/p>\n<p>If your machine is in network of any organization, then firstly isolate it immediately. Patch with latest updates of installed software&#8217;s and clean the system.<\/p>\n<p>As Emotet can move laterally in network, your machine can be infected again when you reconnect to network. Identify and clean each infected machine in same network. It\u2019s really complex process to follow. One can always choose Quick-heal Antivirus \/ Seqrite Endpoint Security to avoid this complex process and stay safe with cleaning of already infected machines and proactively blocking against future Emotet infections.<\/p>\n<p><strong>Preventive measures<\/strong><\/p>\n<ol>\n<li>Keep your computer up-to-date with the latest updates of Operating system, Security software and other software.<\/li>\n<li>Don\u2019t open any link in the mail received from an unknown\/untrusted source.<\/li>\n<li>Don\u2019t download attachments received by an unknown\/untrusted source.<\/li>\n<li>Don\u2019t enable \u2018macros\u2019 for Microsoft\u2019s office documents.<\/li>\n<li>Educate yourself and others for keeping strong passwords.<\/li>\n<li>Use two-factor authentication where-ever possible.<\/li>\n<\/ol>\n<p><strong>Conclusion:<\/strong><\/p>\n<p>Stats indicate that we are detecting thousands of Emotet samples per day in last few months and still NO customer escalation\/issue has been reported. With this we can say that Quick Heal is able to stop Emotet till today&#8217;s date. As its always cat and mouse game between malware and security vendors, we expect evolution of Emotet to next step. We will be continuously monitoring Emotet for future also and will ensure all customers are secured from such malwares.<\/p>\n<p><strong>To read more about the detailed analysis of the Emotet, <\/strong><a href=\"https:\/\/quickheal.co.in\/documents\/technical-paper\/Whitepaper_HowToPM.pdf\"><strong>download<\/strong><\/a><strong> this PDF.<\/strong><\/p>\n<p>Content Courtesy:<\/p>\n<p>Bajrang Mane, Security Labs<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Emotet malware was first identified in 2014 as Banking trojan. Emotet has evolved from banking trojan to threat distributor till now. It has hit many organizations very badly in 2018 with its functionalities like spamming and spreading. Further with its widespread rich\/existence at many organizations, it became threat distributor. Since mid of 2018, Emotet is [&hellip;]<\/p>\n","protected":false},"author":53,"featured_media":87701,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1611,1395],"tags":[],"class_list":["post-87705","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-banking-trojan","category-vulnerability"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87705"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=87705"}],"version-history":[{"count":2,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87705\/revisions"}],"predecessor-version":[{"id":87707,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87705\/revisions\/87707"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/87701"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=87705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=87705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=87705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}