The Emotet botnet έχει αρχίσει να uses ένα νέο κακόβουλο συνημμένο που προσποιείται ότι είναι ένα μήνυμα από το Windows Update που σας λέει να αναβαθμίσετε το Word.
Emotet is malware that spreads through spam emails that contain malicious Word or Excel documents. These documents use macros to download and install Emotet Trojan on the victim's computer. The trojan uses the computer to send spam and eventually leads to a ransomware attack on the victim's network.
After a brief hiatus, the malware Emotet returned to service on October 14 and began sending malicious spam content worldwide.
Αυτές οι ανεπιθύμητες καμπάνιες προσποιούνται ότι είναι τιμολόγια, πληροφορίες αποστολής, πληροφορίες για τον COVID-19, πληροφορίες σχετικά με την υγεία του Προέδρου Trump, βιογραφικά ή παραγγελίες market.
These junk e-mail attachments include malicious Word (.doc) attachments or download links.
When opened, these attachments will prompt the user to "Enable Content" to run malicious macros that will install the malicious Emotet software on the computer.
Upon its return, Emotet released a new template that pretends to be a message from Windows Update stating that Microsoft Word should be updated before viewing the document.
To update Word, the message tells the user to click the Enable Editing and Enable Content buttons, which will cause the malicious macros to be enabledorders,
These malicious macros will download and install the malicious Emotet software onto the victim's computer, as shown below.
Emotet is considered the most widespread malware today. It is also highly dangerous as it installs more malware programs such as Trickbot and QBot on the victim's computer.
While TrickBot and QBot have their own malicious activity, such as stealing passwords, banking information and various other information, they also often lead to ransomware Conti (TrickBot) or ProLock (QBot) ransomware attacks.
So it is vital that you recognize the malicious document templates used by Emotet so that you do not accidentally become infected.