Emotet exposed: looking inside highly destructive malware

被引:13
作者
SophosLabs Research Team
机构
来源
Network Security | 2019年 / 2019卷 / 06期
关键词
Emergency services;
D O I
10.1016/S1353-4858(19)30071-6
中图分类号
学科分类号
摘要
As malware, Emotet is so prolific and dominant that the US Cyber Emergency Response Team (US-CERT), the body tasked with tracking cyberthreats to the country, named Emotet in July 2018, as: “among the most costly and destructive malware” to affect governments, enterprises and organisations large and small, as well as individual computer users.1 Emotet is so prolific that the US Cyber Emergency Response Team (US-CERT) said it is, “among the most costly and destructive malware” to affect governments and enterprises. The best way to combat a threat is to understand it. So in this article, the SophosLabs Research Team picks the malware apart to see how it functions. They examine the infection vectors and delivery mechanisms, how the malware tries to hide and how Emotet uses the Windows system itself to persist and carry out its malicious work. © 2019 Elsevier Ltd
引用
收藏
页码:6 / 11
页数:5
相关论文
共 3 条
[1]  
‘Alert (TA18-201A): Emotet Malware’. US-CERT, (2018)
[2]  
‘Windows Password Recovery Tools’. Nirsoft
[3]  
Cimpanu C., ‘BitPaymer ransomware infection forces Alaskan town to use typewriters for a week’. Bleeping Computer, (2018)