BleepingComputer reports that the Emotet malware operation has launched new email campaigns spamming email addresses around the world, indicating the botnet's reemergence following a nearly five-month hiatus.
Stolen email reply chains have been leveraged by Emotet in the latest email campaign to facilitate malicious Excel attachment distribution, according to Proofpoint threat researcher and Cryptolaemus member Tommy Madjar.
Examination of samples in VirusTotal revealed Emotet's use of various attachments purporting to be invoices, electronic forms, and scans in different languages. Emotet has also leveraged a novel Excel attachment template that could facilitate Microsoft Protected View evasion. While files downloaded from the internet would typically prompt the inclusion of the Mark-of-the-Web flag to enable the file to be opened in Protected View, the new Emotet attachment orders recipients to place a copy of the file in the "Templates" folder in an effort to bypass Protected View.
However, Madjar noted that no additional malware payloads have been deployed so far as part of the latest Emotet campaign.
Numerous web browsers and cryptocurrency wallets on Windows systems are being targeted by the new Bandit Stealer information-stealing malware, which could also evade Windows Defender, and be used to facilitate data breaches, account takeovers, identity theft, and credential stuffing attacks, reports The Record, a news site by cybersecurity firm Recorded Future.
More threat actors have been leveraging the AceCryptor malware to facilitate malware distribution, recording more than 240,000 detections from 2021 to 2022, The Hacker News reports.
BleepingComputer reports that recent phishing attacks by the QBot malware operation, also known as Qakbot, have involved the exploitation of a DLL hijacking flaw in the Windows 10 WordPad executable "write.exe."