Email security, Security Strategy, Plan, Budget

Emotet phishing campaign resumes after bug fix

Emotet malware operators have restarted their newly-launched phishing campaign after fixing a vulnerability that prevented infections when malicious email attachments were opened, BleepingComputer reports. Password-protected ZIP file attachments with Windows LNK files impersonating Word files have been discovered in the new campaign, which was just launched on Friday, with double-clicks on the LNK file prompting the execution of a command that eventually triggers a Visual Basic Script file. However, a vulnerability in the command that leveraged a static shortcut name different from the actual name of the file prompted command failure, according to Cryptolaemus. While the campaign was shut down immediately after the discovery of the flaw, the issue has been addressed by Emotet yesterday, with the group recommencing the delivery of malicious emails that now refer to the proper file names upon command execution. Several email attachments leveraged in the relaunched Emotet campaign have been detailed by email security firm Cofense.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.