Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
15 Schools Hit By Cyberattack In Nottinghamshire
Qualys Hit With Ransomware And Customer Invoices Leaked
Experts Reaction On PrismHR Hit By Ransomware Attack
Expert Insight On Ryuk’s Revenge: Infamous Ransomware Is...
ObliqueRAT Trojan Lurks On Compromised Websites – Experts...
Microsoft Multiple 0-Day Attack – Tenable Comment
Experts Reaction On Malaysia Airlines 9 Years Old...
IoT Security In The Spotlight, As Research Highlights...
Oxfam Australia Confirms ‘Supporter’ Data Accessed In Cyber...
Expert Reaction On Solarwinds Blames Intern For Weak...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Sherrod DeGrippo
Senior Director, Threat Research and Detectionfeature_status*/ ?>
Proofpoint

Comments Dotted : 4
January 28, 2021

Emotet Takedown – What’s Next

At this stage, it’s difficult to tell what this global action will bring.

Emotet has been with us for many years. TA542, the actor behind the botnet, has been tracked by Proofpoint since 2014, when reports of their signature payload, Emotet, emerged. 

 

It has since become known as one of the world’s most disruptive threats. What makes Emotet particularly dangerous for organizations is that it has been the primary foothold for the future deployment of other banking trojans. At this point, any mainstream banking trojan may lead to devastating ransomware attacks.

.....Read More

Emotet has been with us for many years. TA542, the actor behind the botnet, has been tracked by Proofpoint since 2014, when reports of their signature payload, Emotet, emerged. 

 

It has since become known as one of the world’s most disruptive threats. What makes Emotet particularly dangerous for organizations is that it has been the primary foothold for the future deployment of other banking trojans. At this point, any mainstream banking trojan may lead to devastating ransomware attacks. Their campaign volume is typically large, as we usually observe hundreds of thousands of emails per day when Emotet is operating. 

 

At this stage, it’s difficult to tell what this global action will bring. Law enforcement events can have and previously have had a variable impact on disrupting the technology and operators of these large-scale botnets. Considering this appears to be a law enforcement action on the backend infrastructure of the Emotet botnet, this really could be the end. Further to this, if the threat actors behind the botnet (TA542) were apprehended or even disrupted in some way, that could have a significant impact on the potential of future operations.

  Read Less
Like(0)  (0)

Linkedin Message

@Sherrod DeGrippo, Senior Director, Threat Research and Detection, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"At this stage, it’s difficult to tell what this global action will bring...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/emotet-takedown-whats-next

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Sherrod DeGrippo, Senior Director, Threat Research and Detection, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"At this stage, it’s difficult to tell what this global action will bring...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/emotet-takedown-whats-next

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
October 08, 2020

Expert Advise On Cybercriminals Using Trump COVID-19 Illness To Spread Malware

A strong user education program that reinforces the risks posed by links and attachments is encouraged.
This campaign attempted to spread unknown malware via BazaLoader, a first stage downloader initially observed earlier this year. Proofpoint researchers have previously observed BazaLoader being distributed in high volume email campaigns by a threat actor that is primarily known to distribute TrickBot. From a mitigation standpoint we recommend organizations use a secure email gateway, that features an effective antimalware program, to help ensure these types of threats don’t make it to.....Read More
This campaign attempted to spread unknown malware via BazaLoader, a first stage downloader initially observed earlier this year. Proofpoint researchers have previously observed BazaLoader being distributed in high volume email campaigns by a threat actor that is primarily known to distribute TrickBot. From a mitigation standpoint we recommend organizations use a secure email gateway, that features an effective antimalware program, to help ensure these types of threats don’t make it to users’ inboxes. A strong user education program that reinforces the risks posed by links and attachments is also encouraged.  Read Less
Like(0)  (0)

Linkedin Message

@Sherrod DeGrippo, Senior Director, Threat Research and Detection, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"A strong user education program that reinforces the risks posed by links and attachments is encouraged...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-advise-on-cybercriminals-using-trump-covid-19-illness-to-spread-malware

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Sherrod DeGrippo, Senior Director, Threat Research and Detection, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"A strong user education program that reinforces the risks posed by links and attachments is encouraged...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-advise-on-cybercriminals-using-trump-covid-19-illness-to-spread-malware

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
October 04, 2020

Ahead Of U.S. Election, Email Attack Mimics Democratic Pitches For Volunteers – Expert Reaction

Today Proofpoint prevented thousands of malicious emails from hitting unsuspecting voters nationwide.
Today Proofpoint prevented thousands of malicious emails from hitting unsuspecting voters nationwide—and it’s essential that everyone is aware that threat actors are actively working to impersonate trusted sources this election season. Emotet is one of the world’s most disruptive threats and their quick use of DNC-themed emails following this week’s presidential debate demonstrates just how swiftly threat actors can tailor their email lures to focus on prominent events. To avoid.....Read More
Today Proofpoint prevented thousands of malicious emails from hitting unsuspecting voters nationwide—and it’s essential that everyone is aware that threat actors are actively working to impersonate trusted sources this election season. Emotet is one of the world’s most disruptive threats and their quick use of DNC-themed emails following this week’s presidential debate demonstrates just how swiftly threat actors can tailor their email lures to focus on prominent events. To avoid impersonation attempts this election cycle, approach all unsolicited emails with extreme caution especially if they ask you to take urgent action. Do not open email attachments or click on emailed links and be sure to deeply examine any and all digital communication surrounding the election to verify authenticity and reduce risk.  Read Less
Like(0)  (0)

Linkedin Message

@Sherrod DeGrippo, Senior Director, Threat Research and Detection, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Today Proofpoint prevented thousands of malicious emails from hitting unsuspecting voters nationwide...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/ahead-of-u-s-election-email-attack-mimics-democratic-pitches-for-volunteers-expert-reaction

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Sherrod DeGrippo, Senior Director, Threat Research and Detection, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Today Proofpoint prevented thousands of malicious emails from hitting unsuspecting voters nationwide...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/ahead-of-u-s-election-email-attack-mimics-democratic-pitches-for-volunteers-expert-reaction

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
January 17, 2020

Return Of Emotet In New 2020 Campaign – Expert On Research

TA542’s recent uptick in activity shows that threat actors work smarter not harder.
Emotet is one of the world’s most disruptive threats and organizations worldwide should take its return seriously. They have a massive sending infrastructure—nobody hits volumes like they do. TA542’s recent uptick in activity shows that threat actors work smarter not harder. They took 150 days off in 2019 and even with breaks, they’re incredibly effective. When TA542 returned in September 2019 from a summer hiatus, they accounted for over 11% of all malicious attachments we saw.....Read More
Emotet is one of the world’s most disruptive threats and organizations worldwide should take its return seriously. They have a massive sending infrastructure—nobody hits volumes like they do. TA542’s recent uptick in activity shows that threat actors work smarter not harder. They took 150 days off in 2019 and even with breaks, they’re incredibly effective. When TA542 returned in September 2019 from a summer hiatus, they accounted for over 11% of all malicious attachments we saw globally for the entire third quarter of that year despite being active for only two weeks during that three month period. It’s important security teams continue to secure their email channel and educate users regarding the increased risks associated with email attachments.  Read Less
Like(7)  (0)

Linkedin Message

@Sherrod DeGrippo, Senior Director, Threat Research and Detection, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"TA542’s recent uptick in activity shows that threat actors work smarter not harder. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/return-of-emotet-in-new-2020-campaign-expert-on-research

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Sherrod DeGrippo, Senior Director, Threat Research and Detection, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"TA542’s recent uptick in activity shows that threat actors work smarter not harder. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/return-of-emotet-in-new-2020-campaign-expert-on-research

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Stephen Kapp, CTO and Founder, Cortex Insight

"Updating and patching systems should be a priority for schools and mandatory for their pupils. "

15 Schools Hit By Cyberattack In Nottinghamshire

Jake Moore, Cybersecurity Specialist, ESET

"In general, malicious actors now use full-blown extortion tactics to make sure they get what they came for in attacks like this. "

Qualys Hit With Ransomware And Customer Invoices Leaked

Ilia Kolochenko, CEO, ImmuniWeb

"Qualys’s response to the incident is a laudable example of transparent and professional handling of a security incident. "

Qualys Hit With Ransomware And Customer Invoices Leaked

Natalie Page, Cyber Threat Intelligence Analyst, Sy4 Security

"Due to the nature of this organisation, PrismHR makes for an extremely valuable target to an adversary looking to extract sensitive information. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Lewis Jones, Threat Intelligence Analyst, Talion

"Ransomware renders any files it touches unreadable unless, and until, a victim pays for a digital key needed to unlock the encryption on them. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Stephen Kapp, CTO and Founder, Cortex Insight

"An attack like this will not only impact PrismHR but also its customers who will need access to systems in order to pay employees. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Richard Walters, CTO , Censornet

"“Careless clicks sink ships.” "

Expert Insight On Ryuk’s Revenge: Infamous Ransomware Is Back And Stronger Than Ever

Saryu Nayyar, CEO, Gurucul

"The evolution of the ObliqueRAT trojan is a good example of how malicious actors are constantly updating their tools and techniques. "

ObliqueRAT Trojan Lurks On Compromised Websites – Experts Comments

James McQuiggan, Security Awareness Advocate, KnowBe4

"It is essential to conduct red team or pen testing exercises. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Nikos Mantas, Incident Response Expert, Obrela Security Industries

"Data security should be a priority for all organisations today. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

David Sygula, Senior Cybersecurity Analyst , CybelAngel

"Organisations must constantly scan for leaked documents outside the enterprise perimeter. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Satnam Narang, Senior Research Engineer, Tenable

"We expect other threat actors to begin leveraging these vulnerabilities in the coming days and weeks. "

Microsoft Multiple 0-Day Attack – Tenable Comment

Sam Curry, Chief Security Officer, Cybereason

"Total transparency is needed and they need to hone in on more specific details and be completely transparent with Enrich members. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Florian Thurmann, Technical Director, EMEA , Synopsys Software Integrity Group

"Your organisation won’t be able to determine which of their employees has made a given change in the system. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Alan Grau, VP of IoT , Sectigo

"Best-practices for IoT device security include strong authentication and secure software updates. "

IoT Security In The Spotlight, As Research Highlights Alexa Security Flaws

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel