In January 2021 the FBI partnered with global law enforcement agencies and private companies to take down the Emotet malware. However, just eleven months later, Emotet continues to attack and evolve, emphasizing the need for organizations to prioritize cyber security in the new year.
Continued Emotet Attacks Highlight 2023 Malware Dangers
originally appeared on PRWeb
Hoboken, N.J., January 18, 2023 - A NYC area cybersecurity consultant and managed services provider (MSP) considers a recent wave of Emotet attacks in a new article. The informative article first confirms the return of the dangerous malware 11 months after law enforcement and cyber security experts from around the world celebrated its demise.
Describing it as the Botnet that refuses to die, the author
describes how Emotet attacks work by using phishing campaigns to trick
organizations into infecting themselves with malicious software. He then offers
steps to mitigate the dangers of Emotet attacks, including disabling Microsoft
Office macros, updating email filters, and security
awareness training.
“In January 2021 the FBI partnered with global law enforcement
agencies and private companies to take down the Emotet malware,” stated Almi
Dumi, CISO, eMazzanti Technologies. “However, just eleven months later, Emotet
continues to attack and evolve, emphasizing the need for organizations to
prioritize cyber security in the new year.”
Below are a few excerpts from the article, “Continued Emotet Attacks Highlight 2023 Malware Dangers.”
The Botnet that Refuses to Die
“Emotet first emerged in 2014 as a simple banking trojan.
Since then, it has evolved into one of the most dangerous botnet operations in
the threat landscape. Two years ago, a combined effort of law enforcement and
cyber security experts from around the world celebrated its demise. But Emotet
re-appeared after months, stronger than ever.”
“Emotet attacks use phishing campaigns to trick
organizations into infecting themselves with malicious software. Typically, the
phishing emails include attached Microsoft files that contain dangerous macros.
When executed, the macros spread the Emotet infection throughout a network of
connected devices, creating a robot network or botnet.”
Steps to Mitigate the Danger of Emotet Attacks
“Organizations should take deliberate steps to reduce the
risk of a successful attack. For instance, since Emotet typically uses macros
in attached Microsoft Office files, companies should consider disabling macros
unless they are signed.”
“Additionally, Emotet and other malware families commonly
use email as a delivery device. Consequently, organizations should periodically
review and update their email filters. And they should conduct regular security
awareness training and phishing simulations. End users may prove the most
important defense.”
Strengthen Cyber Defenses with Expert Help
Organizations cannot afford to leave critical digital assets
under-protected. At the same time, the economic downturn and the cyber security
skills gap make it difficult for companies to mount an effective defense.
Partnering with cyber security experts can help.
eMazzanti Technologies provides a full range of cyber securityservices, from risk assessments and penetration testing to continuous
monitoring and emaildefense. The company’s consultants work with organizations to tailor a
security strategy to various needs and budgets.
Have you read?
OutsourceCyber Security for a Safe 2023
About eMazzanti Technologies
eMazzanti’s team of trained, certified IT experts rapidly
deliver increased revenue growth, data security and productivity for clients
ranging from law firms to high-end global retailers, expertly providing
advanced retail and payment technology, digital marketing services, cloud and
mobile solutions, multi-site implementations, 24×7 outsourced network
management, remote monitoring, and support.
eMazzanti has made the Inc. 5000 list 9X, is a 4X Microsoft
Partner of the Year, the #1 ranked NYC area MSP, NJ Business of the Year and 5X
WatchGuard Partner of the Year! Contact: 1-866-362-9926, info@emazzanti.net
or http://www.emazzanti.net Twitter:
@emazzanti Facebook: Facebook.com/emazzantitechnologies.