Blog

Updating your main database: your brain

August 12 2019

Emotet Malware

Emotet, the biggest malware threats in recent years

Emotet is a banking Trojan that started out stealing information from individuals, like credit cards details. It has been lurking around since 2014 and has evolved tremendously over the years, becoming major threat that infiltrates corporate network and spreads other strains of malware.

Emotet poses a grave risk for individuals and businesses of all sizes. Here’s a look at what you can do to safeguard your business against this pernicious Trojan malware.

How does Emotet infect networks?

It starts with a simple phishing email that contains an attachment or a link to download a file. The recipient is persuaded to click the link or open the file and they unwittingly set in motivation a macro that downloads a malicious payload. As soon as the device is infected, Emotet starts trying to spread to other devices on the network.

The addition of new capabilities into Emotet, inspired by other successful malware such as WannaCry, has made it a much more potent threat capable of moving laterally and infecting entire networks alarmingly quickly. It’s a modular Trojan that’s often employed as the vanguard of a bigger attack, piercing the outer defences and then downloading other banking Trojans and spreading them around.

As persistent and pernicious as Emotet is, you can take effective action to guard against it. Here are a few ways to do exactly that.

How to prevent infection by the Emotet Trojan

Prevention is better that cure. First, ensure that you don’t have unsecured devices on your network. Take steps to identify and secure unmanaged devices. Eradicate potential blind spots like internet of things devices. Even if Emotet appears to be confined to an unsecured machine, the threat has not been neutralized because it’s polymorphic, constantly updating itself and working towards spreading further. Given enough time, it has a good chance of finding a weakness in your defences that can be exploited.

If you scan your network, then patch any unsecured machine and ensure everything has the latest endpoint protection, then you can dramatically reduce the risk of infection. This will stand you in a good stead against a myriad of threats, not just Emotet.

You should also consider the human element. Since infections begin with people, consider how to combat mobile phishing attacks and put a comprehensive security awareness training program in place. If you can stop an employee from opening that file or clicking that link in the first place, the Emotet will struggle to find a foothold on your network.

Because Emotet is constantly evolving, it’s vital to have the ultimate real time NTA (Network Traffic Analysis) tools as Redborder in the fight against malware like this.

 

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read more