April 7, 2020 By David Bisson 2 min read

Emotet brought down the entire network of a targeted organization by overheating all of its connected computers.

Microsoft’s Detection and Response Team (DART) observed that the Emotet attack began at “Fabrikam,” a pseudonym for the affected organization, when malicious actors targeted one of its employees with a phishing email. Once the recipient opened the attachment, the file informed them that it would open in cmd.exe format and communicate with the internet. Consent by the recipient allowed the file to steal the employee’s credentials and exfiltrate them to the attackers’ server.

Three days after this initial compromise, the campaign implemented its second stage by using the compromised employee’s email account to target other Fabrikam workers and external contacts with phishing emails. This stage enabled the operation to drop its Emotet payload on as many computers as possible. Just a few days after that, Emotet succeeded in maxing out the central processing unit (CPU) of all infected workstations, thereby freezing their machines. In so doing, the malware effectively took down the network and halted all IT operations at Fabrikam.

Ushering in the 2020s With Emotet

Emotet has begun the new decade with a bang. In early January, Cisco Talos revealed that it had witnessed a surge of activity in which the malware targeted the .mil and .gov top-level domains (TLDs). Less than a month later, IBM X-Force identified a campaign in which the threat leveraged tailored spam messages to target users in Japan. Also in February, Binary Defense disclosed a new variant of the malware that abused the wlanAPI interface to spread over a local area network (LAN).

How to Defend Against a Phishing Attack

Security professionals can help their organizations defend against an Emotet-laden phishing attack by using ongoing phishing simulations. Doing so will help teams evaluate their workforce’s familiarity with and preparedness against email attacks. Additionally, infosec personnel should leverage a least privilege model to limit the number of employees who can access high-value systems and data.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today