• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News

Emotet Pivots From Office Macros to OneDrive URLs and PowerShell, Security Researchers Warn

With Microsoft taking action preventing the malicious use of Office macros, the Emotet operators are turning to OneDrive URLs and PowerShell.

April 27, 2022 Zachary Comeau Leave a Comment

XorDdos, Linux DDoS Trojan
stock.adobe.com/Alexander Limbach

Notorious botnet Emotet is reportedly testing out new attack methods that bypass new Microsoft protections against Macros in Office documents and leverage OneDrive URLs and PowerShell.

The Emotet botnet began its reemergence in November 2021 after its January 2021 takedown by a multinational coalition of law enforcement, with the group associated with the botnet targeting “thousands of customers with tens of thousands of messages in multiple geographic regions,” with some message volumes reaching over 1 million per campaign, according to cybersecurity firm Proofpoint. However, the newly discovered Emotet activity suggests that the Emotet group is testing new techniques on a smaller scale and in a more selective, targeted nature— a departure from its typical massive scale email campaigns.

According to Proofpoint, the firm detected a low volume of emails distributing the Emotet malware via compromised sender emails not sent by the Emotet spam module. Email subject lines contained one word, such as “Salary” with bodies containing only OneDrive URLs that hosted zip files containing Microsoft Excel Add-in (XLL) files.

In its analysis of the newly discovered campaign, Proofpoint says the zip archives and XLL files used the same lures as the email subject lines, with one archive containing four copies of the same XLL file with names such as “ “Salary_and_bonuses-04.01.2022.xll.” When those files are executed, they drop and run Emotet, leveraging the Epoch 4 botnet.

The low-volume nature of the activity, the use of OneDrive URLs and XLL files set this campaign apart from historic Emotet campaigns marked by a high volume of emails and Microsoft Office documents containing VBA or XL4 macros.

Microsoft in February announced that it would be disabling VBA macros for Office apps by default to help prevent malware deployments to unwitting end users, covering Access, Excel, PowerPoint, Visio and Word on Windows devices. Those changes began rolling out earlier this month.

With Office macros no longer a reliable distribution vehicle for malware, this new Emotet campaign suggests that threat actors are adapting their techniques and finding new ways to attack victims.

Proofpoint says this low-volume campaign began during a quiet period for Emotet earlier this month, using a break from its high-volume campaigns to test this new attack vector and others.

Also this week, security researchers have discovered another new Emotet attack vector that uses PowerShell in LNK attachments instead of Office macros.

According to Slovakia-based cybersecurity company ESET, if a victim is tricked into downloading and running the attachment, the Emotet binary (.DLL) is downloaded and executed.

#BREAKING Another day at #ESETresearch, another #Emotet campaign with a new technique. Instead of the usual Office macros, operators use PowerShell in LNK attachments – filename “form.lnk”. If the victim runs the file, Emotet binary (.DLL) is downloaded and executed. 1/4 pic.twitter.com/iLzFl5t8M5

— ESET research (@ESETresearch) April 26, 2022

Tagged With: Botnet, Cybersecurity, Emotet, ESET, macros, Malware, OneDrive, PowerShell, Proofpoint

Related Content:

  • Barracuda networks ransomware, cyberinurance Ransomware Actors May Be Targeting Organizations With Cyber…
  • Bitwarden Secrets manager Bitwarden Releases Beta of Secrets Manager for DevOps…
  • AVer PTZ cameras, the PTZ310UNV2 and PTZ310UV2. AVer Introduces 4K 12X AI PTZ Cameras
  • Cisco Webex Board Pro, MIcrosoft Teams, Webex You Can Now Natively Run Microsoft Teams Rooms…

Free downloadable guide you may like:

  • Four IT Trends That Will Define 2023Expert Series: Four IT Trends That Will Define 2023

    Learn about four key technologies we identified as critical to your IT organization’s success in 2023, as well as how to invest in new innovations emerging from each.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Four IT Trends That Will Define 2023
Expert Series: Four IT Trends That Will Define 2023

Learn about four key technologies we identified as critical to your IT organization’s success in 2023, as well as how to invest in new innovations ...

Harnessing the Power of Digital Signage
Harnessing the Power of Digital Signage

Choosing the best solutions for messaging, branding, and communicating in today’s content-everywhere landscape

Blueprint Series Cover: What works for hybrid work
Blueprint Series: What Works for Hybrid Work

Download this free resource to learn about how IT leaders can effectively manage and implement a hybrid work model.

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.