As of April 25, 2021, the Emotet malware was automatically removed from all computers with Windows. This was done through a cleanup feature that Law Enforcement International had installed on infected systems as early as January 2021.
The Emotet is a family of malware in the form of macros that infect email recipients with Trojans by sending seemingly authentic emails. When a recipient opens the email attachment, the malicious modules software they are loaded and running.
Emotet has been responsible for many successful ransomware attacks against companies, government agencies and organizations worldwide. Emotet was considered the most dangerous malware in the world and until recently it infected a large number of systems of companies, authorities and institutions, in addition to the computers of hundreds of thousands of individuals.
Emotet's so-called "downloader" could infect victim systems and download additional malware to intercept online banking, copy stored passwords, or encrypt the system for extortion.
By acquisition access to Emotet Command & Control (C&C) servers τον Ιανουάριο του 2021, οι αρχές επιβολής του νόμου μπόρεσαν να τροποποιήσουν τη mode malware loaders, install their own modules on the infected systems of victims and at the same time disable the malware's functions. Since then, victims' systems could only communicate with controlled C&C servers.
So the authorities added an uninstall script to the systems to automatically uninstall the Emotet malware from the infected systems on April 25, 2021. The script deleted all services related to Emotet.