Researchers at cybersecurity firm Proofpoint have observed that the prolific botnet Emotet has returned to the email threat landscape after a hiatus at the end of 2019. The Trojan-turned-botnet is being distributed by threat group TA542, using attachments and malicious links containing the botnet payload. So far in 2020, Proofpoint has observed Emotet targeting pharmaceutical companies in the US, Mexico, Germany, Japan and Australia amongst other regions and sectors.
Experts Comments
While it is important to have technical controls in place, many of the social engineering techniques can bypass technical controls.
Emotet is quite difficult to mitigate against with any one security control because of the various techniques and methods it employs.
While it is important to have technical controls in place, many of the social engineering techniques can bypass technical controls. Therefore, it's vital that organisations invest in providing security awareness and training to employees so that they can be better equipped to identify and report any suspicious activity.
Dot Your Expert Comments
Only for registered and approved experts. Please register before providing comments. Register here
Linkedin Message
@Sherrod DeGrippo, Senior Director, Threat Research and Detection, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"TA542’s recent uptick in activity shows that threat actors work smarter not harder. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/return-of-emotet-in-new-2020-campaign-expert-on-research
Facebook Message
@Sherrod DeGrippo, Senior Director, Threat Research and Detection, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"TA542’s recent uptick in activity shows that threat actors work smarter not harder. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/return-of-emotet-in-new-2020-campaign-expert-on-research