The name-and-email-quoting botnet is back and has new tactics

Share This Post

The resumption of operations last week made no difference. For example, a malicious email sent last Tuesday attached a Word document with a large amount of extra data appended to the end. As a result, the file is more than 500 MB, which is large enough to prevent some security products from being able to scan the content. This technique, known as binary padding or file pumping, works by adding zeros to the end of the document. In the event that someone is tricked into activating the macro, the accompanying malicious Windows DLL file is also injected, increasing from 616 KB to 548.1 MB, researchers from security firm Trend Micro said Monday.

Last week, Emotet made its first appearance this year after a four-month hiatus. He’s back on his trademark activism – a wave of malicious spam that appears to come from a known contact, sending recipients by name and ostensibly to reply to an existing thread. When Emotet returned from previous breaks, it brought new techniques designed to evade endpoint security products and trick users into clicking links or activating dangerous macros in Microsoft documents.

Another escape trick was discovered in the attachment: excerpts from Herman Melville’s classic novel Moby Dick, which appear in white font on a blank page, make the text unreadable. Some security products automatically tag Microsoft Office files that contain only macros and images. Invisible text is designed to evade such software without making the target suspicious.

When opened, the Word document displays an image indicating that the content is not accessible unless the user clicks the “Enable Content” button. Last year, Microsoft started disabling macros downloaded from the Internet by default.

Clicking the “enable content” button overrides this default and allows the macro to run. A macro that forces Office to download a .zip file from a legitimate website has been hacked. Office will then unpack the archive and run the bloated Emotet DLL that infects the device.

Read More:

Partnership Between Mitsubishi Electric and Nozomi Networks Strengthens Operational Technology Security Business

Mitsubishi Electric and Nozomi Networks Partnership Mitsubishi Electric and Nozomi...

Solidion Technology Inc. Completes $3.85 Million Private Placement Transaction

**Summary:** 1. Solidion TechnologyInc. has announced a private placement deal...

Analyzing the Effects of the EU’s AI Act on Tech Companies in the UK

Breaking Down the Impact of the EU’s AI Act...

Tech in Agriculture: Roundtable Discusses Innovations on the Ranch

Summary of Tech on the Ranch Roundtable Discussion: ...

Are SMEs Prioritizing Tech Investments Over Security Measures?

SMEs Dive Into Tech Investments, But Are...

Spotify Introduces Music Videos for Premium Members in Chosen Markets

3 Summaries of Spotify Unveils Music Videos for Premium...

Shearwater to Monitor Production at Equinor’s Two Oil Platforms

Shearwater GeoServices secures 4D monitoring projects from Equinor for...

Regaining Europe’s Competitive Edge in Innovation: Addressing the Innovation Lag

Europe’s Innovation Lag: How Can We Regain Our Competitive...

Related Posts

Government Warns of AI-Generated Content: Learn More about the Issue

Government issued an advisory on AI-generated content. All AI-generated content...

Africa Faces Internet Crisis: Extensive Outage Expected to Last for Months, Hardest-Hit Nations Identified

Africa’s Internet Crisis: Massive Outage Could Last Months, These...

FTC Investigates Reddit for AI Content Licensing Practices

FTC is investigating Reddit's plans...

Journalists Criticize AI Hype in Media

Summary Journalists are contributing to the hype and...