• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Network Security, News

Multinational Law Enforcement Officials Take Down Notorious Emotet Botnet

An international group of law enforcement officials have announced a large operation to take down the infrastructure of the malware and botnet Emotet.

January 29, 2021 Zachary Comeau Leave a Comment

Emotet

An international group of law enforcement officials, including the U.S. Department of Justice and Europol, have announced a large operation to take down the infrastructure of the malware and botnet Emotet.

European authorities on Tuesday said they seized control of Emotet, one of the most notorious distributors of malware and hacking-as-a-service operations that has affected millions of Microsoft Windows systems.

The takedown included actions in the U.S., Canada, France, Germany, the Netherlands, U.K., and officials in Lithuania, Sweden and Ukraine assisted in the action, according to the DOJ.

The action required the cooperation of a large multinational group because Emotet’s infrastructure included several hundreds of servers located across the world, each with different functions and capabilities that helped manage the computers of infected victims, spread to new ones, serve other criminal groups and make the network more resilient against takedown attempts, according to European law enforcement agency Europol.

Law enforcement officials were able to gain access to Emotet servers located overseas and identified the IP addresses of about 1.6 million computers that appear to have been infected by Emotet between April 1, 2020 and jan. 17, 2021. More than 45,000 of those were located in the U.S.

In a statement, Europol describes Emotet as one of the most dangerous and sophisticated malware operations in the world.

EMOTET has been one of the most professional and long lasting cybercrime services out there. First discovered as a banking Trojan in 2014, the malware evolved into the go-to solution for cybercriminals over the years. The EMOTET infrastructure essentially acted as a primary door opener for computer systems on a global scale. Once this unauthorised access was established, these were sold to other top-level criminal groups to deploy further illicit activities such data theft and extortion through ransomware.

The Emotet actors used email as an attack vector, utilizing an automated process that delivered malware to victim endpoints via infected email attachments.

These malicious attachments purported to be invoices, shipping notices and information about COVID-19, according to Europol.

Bye-bye botnets👋 Huge global operation brings down the world’s most dangerous malware.

Investigators have taken control of the Emotet botnet, the most resilient malware in the wild.

Get the full story: https://t.co/NMrBqmhMIf pic.twitter.com/K28A6ixxuM

— Europol (@Europol) January 27, 2021

Once those files were opened, they were prompted to “enable macros” that enabled malicious code hidden in the file to install Emotet on the device.

However, what made the malware even more dangerous was that the group behind Emotet offered the malware for hire to other bad actors, which resulted in banking Trojans and ransomware on victim devices.

“This type of attack is called a ‘loader’ operation, and EMOTET is said to be one of the biggest players in the cybercrime world as other malware operators like TrickBot and Ryuk have benefited from it,” Europol said.

Emotet’s victims are numerous, including a school district in North Carolina that had to pay $1.4 million to mitigate an Emotet infection that damaged the school’s computers and disabled the school’s network for two weeks, according to the DOJ.

The U.S. Cybersecurity and Infrastructure Agency estimates that Emotet infections have cost local, state, tribal and territorial governments up to $1 million per incident to mitigate.

According to the DOJ, the FBI and foreign counterparts replaced Emotet malware on servers with files created by law enforcement.

This was done with the intent that computers in the United States and elsewhere that were infected by the Emotet malware would download the law enforcement file during an already-programmed Emotet update. The law enforcement file prevents the administrators of the Emotet botnet from further communicating with infected computers. The law enforcement file does not remediate other malware that was already installed on the infected computer through Emotet; instead, it is designed to prevent additional malware from being installed on the infected computer by untethering the victim computer from the botnet.

According to officials, law enforcement identified more than 20 U.S.-based hosting providers that hosted more than 45 IP compromised IP addresses associated with Emotet.

U.S. officials notified authorities in more than 50 other countries that hosting providers in their jurisdictions hosted hundreds of compromised IP addresses.

For more information and technical details, read this October 2020 report from CISA. The Dutch National Police have also created a website to check whether your email address has been compromised by Emotet.

Tagged With: Cybersecurity, Emotet, Malware

Related Content:

  • Microsoft Loop IT What You Need to Know About Microsoft Loop
  • YAMAHA UC ADECIA Yealink Yamaha UC Partners With Yealink for Audio &…
  • Microsoft, ChatGPT, GPT-4, GPT-3.5 What’s New With ChatGPT and Generative AI This…
  • CISA Ransomware CISA Wants You To Report Anything You Know…

Free downloadable guide you may like:

  • Four IT Trends That Will Define 2023Expert Series: Four IT Trends That Will Define 2023

    Learn about four key technologies we identified as critical to your IT organization’s success in 2023, as well as how to invest in new innovations emerging from each.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Four IT Trends That Will Define 2023
Expert Series: Four IT Trends That Will Define 2023

Learn about four key technologies we identified as critical to your IT organization’s success in 2023, as well as how to invest in new innovations ...

Harnessing the Power of Digital Signage
Harnessing the Power of Digital Signage

Choosing the best solutions for messaging, branding, and communicating in today’s content-everywhere landscape

Blueprint Series Cover: What works for hybrid work
Blueprint Series: What Works for Hybrid Work

Download this free resource to learn about how IT leaders can effectively manage and implement a hybrid work model.

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.