2017-08
While the earlier variants of EMOTET primarily targeted the banking sector, our Smart Protection Network (SPN) data reveals that this time, the malware isn’t being picky about the industries it chooses to attack. The affected companies come from different industries, including manufacturing, food and beverage, and healthcare. Again, it is possible that due to the nature of its distribution, EMOTET now has a wider scope.
https://blog.trendmicro.com/trendlabs-security-intelligence/emotet-returns-starts-spreading-via-spam-botnet/
2018-10
Emotet Awakens With New Campaign of Mass Email Exfiltration
https://www.kryptoslogic.com/blog/2018/10/emotet-awakens-with-new-campaign-of-mass-email-exfiltration/
2018-11
According to our telemetry, the latest Emotet activity was launched on November 5, 2018, following a period of low activity. Figure 1 shows a spike in the Emotet detection rate in the beginning of November 2018, as seen in our telemetry data.
https://www.welivesecurity.com/2018/11/09/emotet-launches-major-new-spam-campaign/
https://www.welivesecurity.com/2018/12/28/analysis-latest-emotet-propagation-campaign/
2018-11
Secret Service Investigates Breach at U.S. Govt IT Contractor
https://krebsonsecurity.com/2019/09/secret-service-investigates-breach-at-u-s-govt-it-contractor/
2019-01
Between January 1, 2019, to May 1, 2019, threat actors conducted thousands of malicious email campaigns, hundreds of which were sent to Canadian organizations. While discussions of threats in this region often focus on “North America” generally or just the United States, nearly 100 campaigns during this period were either specifically targeted at Canadian organizations or were customized for Canadian audiences.
https://www.proofpoint.com/us/threat-insight/post/beyond-north-america-threat-actors-target-canada-specifically
2019-04
Beginning the morning of April 9th, the Emotet gang began utilizing what appears to be the stolen emails of their victims. It was noted back in October of 2018 that a new module was added that could steal the email content on a victim’s machine.
https://cofense.com/emotet-gang-switches-highly-customized-templates-utilizing-stolen-email-content-victims/
2019-09
Emotet is back after a summer break
https://blog.talosintelligence.com/2019/09/emotet-is-back-after-summer-break.html
https://threatpost.com/emotet-resurgence-continues-with-new-tactics-techniques-and-procedures/149914/
2019-12
The city of Frankfurt, Germany, became the latest victim of Emotet after an infection forced it to close its IT network. But the financial center wasn’t the only area that was targeted by Emotet, as there were also incidents that occurred in Gießen and Bad Homburg, a town and a city north of Frankfurt, respectively, as well as in Freiburg, a city in southwest Germany.
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/emotet-attack-causes-shutdown-of-frankfurt-s-it-network
2020-01
Threat actor group TA542, the group that’s behind Emotet, is back from their Christmas holiday. Based on past activity and what we’re seeing in just three days, one of the world’s most disruptive threats is back to work and everyone around the world should take note and implement steps to protect themselves.
https://www.proofpoint.com/us/corporate-blog/post/emotet-returns-after-holiday-break-major-campaigns
https://blog.talosintelligence.com/2020/01/stolen-emails-reflect-emotets-organic.html
2020-01
Pretending to be the Permanent Mission of Norway, the Emotet operators performed a targeted phishing attack against email addresses associated with users at the United Nations.
https://www.bleepingcomputer.com/news/security/united-nations-targeted-with-emotet-malware-phishing-attack/
2020-01
EMOTET Uses Corona Virus Outbreak in New Spam Campaign
https://www.trendmicro.com/vinfo/th/threat-encyclopedia/spam/3682/emotet-uses-corona-virus-outbreak-in-new-spam-campaign
2020-02
Emotet Evolves With new Wi-Fi Spreader
https://www.binarydefense.com/emotet-evolves-with-new-wi-fi-spreader/
2020-02
Emotet SMiShing Uses Fake Bank Domains in Targeted Attacks, Payloads Hint at TrickBot Connection
https://securityintelligence.com/posts/emotet-smishing-uses-fake-bank-domains-in-targeted-attacks-payloads-hint-at-trickbot-connection/
2020-03
Emotet Wi-Fi Spreader Upgraded
https://www.binarydefense.com/emotet-wi-fi-spreader-upgraded/
2020-06
Emotet malware now steals your email attachments to attack contacts
https://www.bleepingcomputer.com/news/security/emotet-malware-now-steals-your-email-attachments-to-attack-contacts/
2020-07
It was never a question of “if” but “when”. After five months of absence, the dreaded Emotet has returned. Following several false alarms over the last few weeks, a spam campaign was first spotted on July 13 showing signs of a likely comeback.
https://blog.malwarebytes.com/trojans/2020/07/long-dreaded-emotet-has-returned/
2020-07
Researchers tracking Emotet botnet noticed that the malware started to push QakBot banking trojan at an unusually high rate, replacing the longtime TrickBot payload.
https://www.bleepingcomputer.com/news/security/emotet-botnet-is-now-heavily-spreading-qakbot-malware/
2020-08
Emotet malware strikes U.S. businesses with COVID-19 spam
https://www.bleepingcomputer.com/news/security/emotet-malware-strikes-us-businesses-with-covid-19-spam/
2020-08
Emotet strikes Quebec’s Department of Justice
https://www.welivesecurity.com/2020/09/16/emotet-quebec-department-justice-eset/
2020-08
Since August, CISA and MS-ISAC have seen a significant increase in malicious cyber actors targeting state and local governments with Emotet phishing emails.
https://us-cert.cisa.gov/ncas/alerts/aa20-280a
2020-10
On October 1, 2020, we observed thousands of Emotet email messages with the subject “Team Blue Take Action” sent to hundreds of organizations in the US. The message body is taken directly from a page on the Democratic National Committee's website, with the addition of a line requesting that the recipient open the attached document.
https://www.proofpoint.com/us/blog/threat-insight/emotet-makes-timely-adoption-political-and-elections-lures
2020-10
New Emotet attacks use fake Windows Update lures
https://www.zdnet.com/article/new-emotet-attacks-use-fake-windows-update-lures/
2020-12
Emotet malware hits Lithuania's National Public Health Center
https://www.bleepingcomputer.com/news/security/emotet-malware-hits-lithuanias-national-public-health-center/
2021-11
Emotet malware is back and rebuilding its botnet via TrickBot
https://www.bleepingcomputer.com/news/security/emotet-malware-is-back-and-rebuilding-its-botnet-via-trickbot/
2021-12
Emotet now drops Cobalt Strike, fast forwards ransomware attacks
https://www.bleepingcomputer.com/news/security/emotet-now-drops-cobalt-strike-fast-forwards-ransomware-attacks/
2022-01
Emotet Spam Abuses Unconventional IP Address Formats to Spread Malware
https://www.trendmicro.com/en_us/research/22/a/emotet-spam-abuses-unconventional-ip-address-formats-spread-malware.html
2022-02
New Emotet Infection Method
https://unit42.paloaltonetworks.com/new-emotet-infection-method/
2022-03
Emotet Targeting Japanese Organizations
https://www.cybereason.com/blog/research/threat-alert-emotet-targeting-japanese-organizations
2022-03
Emotet Spoofs IRS in Tax Season-Themed Phishing Email Campaign
https://cofense.com/blog/emotet-spoofs-irs-in-tax-season/
2022-04
Emotet modules and recent attacks
https://securelist.com/emotet-modules-and-recent-attacks/106290/
2022-04
Emotet botnet switches to 64-bit modules, increases activity
https://www.bleepingcomputer.com/news/security/emotet-botnet-switches-to-64-bit-modules-increases-activity/
2022-04
Emotet malware infects users again after fixing broken installer
https://www.bleepingcomputer.com/news/security/emotet-malware-infects-users-again-after-fixing-broken-installer/
2022-04
Emotet Tests New Delivery Techniques
https://www.proofpoint.com/us/blog/threat-insight/emotet-tests-new-delivery-techniques
2022-04
Emotet malware now installs via PowerShell in Windows shortcut files
https://www.bleepingcomputer.com/news/security/emotet-malware-now-installs-via-powershell-in-windows-shortcut-files/
2022-06
Emotet malware now steals credit cards from Google Chrome users
https://www.bleepingcomputer.com/news/security/emotet-malware-now-steals-credit-cards-from-google-chrome-users/
2022-06
Back From the Dead, Emotet Returns in 2022
https://www.deepinstinct.com/blog/emotet-malware-returns-in-2022
2022-11
Emotet botnet starts blasting malware again after 4 month break
https://www.bleepingcomputer.com/news/security/emotet-botnet-starts-blasting-malware-again-after-4-month-break/
https://blog.talosintelligence.com/emotet-coming-in-hot/