×
ItalianoEnglish
Set as default language

Grandangolo Communications

  • Home
  • Company
  • Services
    • Public Relation
    • Digital PR
    • Marketing
    • Lead Generation
    • Events
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages
  • Home
  • Customer Press Room
  • Eset
  • ESET monitors the comeback of the infamous Emotet botnet, targeting Japan and Southern Europe. Italy among the targets

Customer Press Room

ESET monitors the comeback of the infamous Emotet botnet, targeting Japan and Southern Europe. Italy among the targets

by Grandangolo Communications / Thursday, 06 July 2023 / Published in Eset

Several spam campaigns detected. Mealybug, the criminal group that operates Emotet, has implemented new distribution modules. Since 2022, the majority of attacks recorded by ESET have been aimed at Japan, Italy, Spain, Mexico and South Africa

ESET, a global European leader in the cybersecurity market, has published an account of the movements of the Emotet botnet since it made a comeback after being restricted in 2021. Emotet is a malware family that has been active since 2014, operated by a cybercriminal group known as Mealybug or TA542. Although it began as a banking Trojan, it later evolved into a botnet that has become one of the most widespread threats globally. In January 2021, Emotet was subject to a partial elimination thanks to the commitment and international collaboration of eight countries, coordinated by Eurojust and Europol. Emotet resumed operations in November 2021 and launched several spam campaigns, before stopping abruptly in April 2023. In the latest campaigns from 2022-2023, the majority of attacks detected by ESET were aimed at Japan (nearly half), Italy, Spain, Mexico and South Africa.

"Emotet spreads via spam emails. It can exfiltrate information from compromised computers and distribute third-party malware. Emotet operators pay little attention to their targets, installing the malware on systems belonging to individuals, companies and large organizations," he explains Jakub Kaloč, ESET researcher who worked on the analysis.

From late 2021 to mid-2022, Emotet was primarily spread through MS Word and MS Excel documents with embedded VBA macros. In July 2022, Microsoft changed the game for all malware families such as Emotet and Qbot – which they had used as a distribution method for phishing emails with malicious files – by disabling VBA macros in documents obtained from the Internet.

"The (authorities') disabling of Emotet's main attack vector pushed its operators to look for new ways to compromise their targets. Mealybug began experimenting with malicious LNK and intrusion and a slightly different social engineering technique,” explains Kaloč. “The reduction in the size of the attacks and the continuous changes in the approach lead us to think that the results obtained have not been satisfactory.”

Later, Emotet inserted a decoy into MS OneNote, and despite warnings that this action could lead to malicious content, people tended to interact with it.

After its reappearance, it received several updates. Noteworthy features include the modification of the cryptographic scheme and the implementation of new coverage techniques to protect the botnet modules. Emotet operators have invested significant efforts to avoid tracking and tracing. Additionally, they have implemented several new modules and improved existing ones to remain operational.

Emotet spreads via spam emails, which are often believed to be trustworthy, because they successfully use the thread hijacking technique. Before the ban, Emotet used modules called Outlook Contact Stealer and Outlook Email Stealer to steal Outlook emails and contact information. However, since not everyone uses Outlook, after the takedown, Emotet also focused on a free alternative email application, Thunderbird. Furthermore, it started using Google Chrome Credit Card Steale, to steal credit card data stored in the Google Chrome browser.

According to ESET research and telemetry, Emotet botnets have been silent since early April 2023, most likely due to the identification of a new effective attack vector. The majority of attacks detected by ESET from January 2022 to date targeted Japan (43%), Italy (13%), Spain (5%), Mexico (5%) and South Africa (4%).

For more technical information on Emotet, see the blog post “What’s up with Emotet – A brief summary of what happened with Emotet since its comeback” su WeLiveSecurity.

Tagged under: The emotion, Eset

About Grandangolo Communications

What you can read next

ESET manages the security of the Raicam Group globally
ESET announced Cloud Office Security to provide advanced protection for Microsoft 365 users
ESET announces version 6.0 of Mobile Security for Android

Customer Press Room

  • Vertiv introduces backup power for personal devices and business applications

    Vertiv™ PowerUPS 200 Series is a ...
  • Sandworm Group Hits Energy Company in Poland with DynoWiper: ESET Research Analysis

    ESET researchers have identified DynoWip...
  • Antonio Menghini is the new Chief Commercial Officer of Innovaway

    At the same time, Giuseppe Piccolo took over ...
  • Vertiv introduces a new AI-powered predictive maintenance service for modern data centers and AI factories

    Vertiv™ Next Predict is a new service...
  • Vertiv expands flexible, energy-efficient edge cooling system for small, medium and edge applications in EMEA

    The Vertiv perimeter cooling system...

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018

Categories

  • A10
  • Abstract
  • abstract
  • Acronis
  • Ally Consulting
  • Arrow
  • Arrow Electronics
  • Axiante
  • Babel
  • Computer Center
  • Cohesity
  • Italy Cloud Consortium
  • Consys
  • D-Link
  • Eset
  • G.B. Service
  • Habble
  • HiSolution
  • HYCU
  • Icos
  • Information Tecnology
  • Innovaway
  • Ivanti
  • Link11
  • MobileIron
  • Netalia
  • Nethive
  • Nexthink
  • Nuvis
  • Praim
  • QAD
  • Qualys
  • Red Hot Cyber
  • Riverbed
  • Saviynt
  • Sensormatic
  • SentinelOne
  • Talent Software
  • Vectra
  • Vectra AI
  • Vertiv

Office printing, digital PR, marketing, lead generation: all projects are born from our passion and expertise, with an inevitable touch of creativity and innovation.

COMPANY

Grandangolo Communications Srl
Via Sardegna 19
20146 Milano
Telephone +39 335 8283393
info@grandangolo.it

I SERVIZI

  • Home
  • Company
  • Services
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages

CONTACTS

  • Contacts
  • Cookie policy
  • Privacy policy

© 2019 GRANDANGOLO COMMUNICATIONS SRL | P.IVA IT 06394850967 | All rights reserveD.

Powered by Webpowerplus

TOP