in

This latest phishing scam is spreading fake invoices loaded with malware

A notorious malware campaign is targeting banks and financial institutions in the US and the UK with cyber attacks which are not only destructive in their own right, but also could be used as the basis for future intrusions by other hackers.

Emotet started life as a banking trojan,  but has also evolved into a botnet, with its criminal operators leasing out its capabilities to those who want to distribute their own malware to compromise machines.

Such was the power of Emotet that at one point last year it accounted for almost two-thirds of malicious payloads delivered in phishing attacks.

Emotet activity appeared to decline during December, but it sprung back to life in January and it currently shows no signs of slowing down as researchers at Menlo Security have detailed yet another campaign.

This time, the attacks have been directed at organisations in financial services, with small numbers also targeted at the food, media and transportation industries. Three quarters of the attacks have been directed towards organisations in the US or in the UK, with the remaining hacking attempts directed towards the Philippines, Spain and India.

Like previous Emotet attacks, the malware is delivered via phishing emails which contain a malicious Microsoft Word document. This time, the email subject lines are based around invoices, bank details and other financial subjects – common terms to attract the attention of workers in the financial sector.

SEE: A winning strategy for cybersecurity (ZDNet special report) | Download the report as a PDF (TechRepublic)

The attachment claims the user needs to ‘enable content’ in order to see the document; if this is done it allows malicious macros and malicious URLs to deliver Emotet to the machine.

Because Emotet is such a prolific botnet, the malicious emails don’t come from any one particular source, but rather infected Windows machines around the world.

If a machine falls victim to Emotet, not only does the malware provide a backdoor into the system, allowing attackers to steal sensitive information, it also allows the attackers to use the machine to spread additional malware – or allow other hackers to exploit compromised PCs for their own gain.

The campaign spiked towards the end of January and while activity has dropped for now, financial institutions are still being targeted with Emotet phishing campaigns.

“We are continuing to see Emotet traffic, though the intensity has reduced considerably,” Krishnan Subramanian, researcher at Menlo Labs told ZDNet.

In order to protect against Emotet malware, it’s recommended that users are wary of documents asking them to enable macros, especially if it’s from an untrusted or unknown source. Businesses can also disable macros by default.

Organisations should also ensure that operating systems and software are both patched and up-to-date as this can really help to stop malware being successful as many attacks use known vulnerabilities that can readily be patched against.

READ MORE ON CYBER CRIME


Source: Information Technologies - zdnet.com

Dutch court rules AI benefits fraud detection system violates EU human rights

Wacom drawing tablets track every app you open