• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Emotet Botnet’s Latest Resurgence Spreads to Over 100,000 Computers

You are here: Home / Cyber Security News / Emotet Botnet’s Latest Resurgence Spreads to Over 100,000 Computers

The insidious Emotet botnet, which staged a return in November 2021 immediately after a 10-thirty day period-extended hiatus, is after yet again exhibiting signs of continuous growth, amassing a swarm of about 100,000 infected hosts for perpetrating its destructive routines.

“Though Emotet has not but attained the same scale it the moment experienced, the botnet is demonstrating a strong resurgence with a overall of around 130,000 unique bots unfold across 179 countries considering that November 2021,” researchers from Lumen’s Black Lotus Labs mentioned in a report.

Emotet, prior to its takedown in late January 2021 as portion of a coordinated law enforcement procedure dubbed “Ladybird,” had contaminated no fewer than 1.6 million devices globally, performing as a conduit for cybercriminals to install other sorts of malware, these types of as banking trojans or ransomware, on to compromised systems.

The malware formally resurfaced in November 2021 working with TrickBot as a supply automobile, with the latter shuttering its attack infrastructure late previous month after quite a few vital customers of the team have been absorbed into the Conti ransomware cartel.

Emotet’s resurrection is mentioned to have been orchestrated by the Conti gang by itself in an endeavor to change practices in response to elevated legislation enforcement scrutiny into the TrickBot’s malware distribution things to do.

Black Lotus Labs mentioned that the “aggregation of bots definitely failed to start out in earnest until finally January [2022],” including the new variants of Emotet have swapped the RSA encryption plan in favor of elliptic curve cryptography (ECC) to encrypt network website traffic.

Another new addition to its abilities is its capacity to collect supplemental method information beyond a checklist of operating procedures from the compromised devices.

What is far more, Emotet’s botnet infrastructure is said to encompass just about 200 command-and-management (C2) servers, with most of the domains found in the U.S., Germany, France, Brazil, Thailand, Singapore, Indonesia, Canada, the U.K., and India.

Contaminated bots, on the other hand, are intensely concentrated in Asia, mainly Japan, India, Indonesia, and Thailand, adopted by South Africa, Mexico, the U.S., China, Brazil, and Italy. “This is not shocking presented the preponderance of susceptible or out-of-date Windows hosts in the area,” the researchers mentioned.

“The development and distribution of bots is an vital indicator of Emotet’s progress in restoring its after sprawling infrastructure,” Black Lotus Labs observed. “Each bot is a probable foothold to a coveted network and provides an opportunity to deploy Cobalt Strike or finally be promoted to a Bot C2.”

Found this report intriguing? Observe THN on Fb, Twitter  and LinkedIn to read through a lot more unique information we put up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Apple's AirPods Pro are back on sale for $180
Next Post: Ukrainian Hacker Linked to REvil Ransomware Attacks Extradited to United States »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms
  • Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims
  • Securing CI/CD workflows with Wazuh
  • How to Detect Phishing Attacks Faster: Tycoon2FA Example
  • Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps

Copyright © 2025 · AllTech.News, All Rights Reserved.