Trickbot restores Emotet: 140.000 victims in 149 countries

Η (CPR), the research arm of Check Point Software Technologies, is warning of potential ransomware attacks as it sees Emotet samples spreading rapidly through Trickbot. Since the removal of Emotet by the authorities, CPR has estimated 140.000 Trickbot victims in 149 countries in just 10 months. New samples of Emotet spread through Trickbot were discovered by CPR on November 15, 2021. emotet

Emotet is a strong indicator of future ransomware attacks, as malware provides ransomware gangs with access to compromised devices.

Check Point Research (CPR) sees samples of it Emotet spread rapidly through increased Trickbot activity. Emotet, once described as "the most dangerous malware in the world", provides threat backdoors to unsafe devices that could be leased to ransomware gangs and used for their own campaigns. Therefore, the return of Emotet is a strong indication for the future ransomware attacks.

At the beginning of the year, an international law enforcement operation coordinated by Europol and Eurojust managed to take control of Emotet's infrastructure and arrested two people. Ten months later, on November 15, 2021, Trickbot-infected devices began dropping Emotet samples by sending users zip files with password downloads, which contain malicious documents that reconstruct the Emotet botnet network. Emotet has also upgraded its features, adding some new tricks to its toolbox.

1 Chart. The chart below shows the victims of Emotet in the year 2021.
cp1

140,000 + Trickbot victims

Trickbot has shown a persistent growth rate. CPR has identified more than 140.000 victims affected by it since the abolition of botnet, including organizations and individuals. Trickbot affected a total of 149 countries, or more than 75% of all countries in the world.

2 Chart. The Dynamics of the Trickbot on infected machines from November 1, 2020

cp2

Trickbot and Geographic Data

Almost one third of all Trickbot targets are in Portugal and the USA.

Graph 3. The victims of Trickbot from November 1, 2020 grouped by country

cp3

Trickbot per Market

The CPR monitored the distribution of victims by industry, which is shown in the graph below. Victims from high-profile industries make up more than 50% of all victims.

4 Chart. Trickbot victims from November 1, 2020 grouped by industry
cp4

Comment by Lotem Finkelstein, Head of Threat Intelligence at Check Point Software:

"Emotet was the most powerful botnet in the history of cybercrime with a rich infection base. Now, Emotet has resold its infection base to other threat carriers to spread its most commonly malicious software. ransomware. The return of Emotet is an important warning sign for another increase in ransomware attacks as we enter 2022. ”

“Trickbot, which has always worked with Emotet, facilitates its return by promoting it to infected victims. This has allowed Emotet to start from a very stable position rather than from scratch. In just two weeks it became the 7th most popular malware, as you will notice in the most recent list of the most prevalent malware. Emotet is the best that we have for future ransomware attacks and as ransomware we should deal with Emotet and Trickbot infections, otherwise, it is only a matter of time before we face a real ransomware attack.”

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.
Trickbot, emotet, iguru

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).