Emotet malware operation resumes after hiatus

March 8, 2023

After a three-month hiatus, the Emotet malware operation resumed spamming malicious emails on Tuesday morning, rebuilding its network and infecting devices worldwide.

The Emotet botnet has resumed sending emails, according to the cybersecurity firm Cofense and the Emotet-tracking group Cryptolaemus. “Emotet malicious email activity resumed on Tuesday, March 7, 2023 at 8:00am EST,” according to the Cofense website.

The malicious emails include unprotected.zip files as attachments. While the attached.zip files deliver malicious macros in Office documents, which download and execute the Emotet.dll. However, it is unknown how long this round of email activity will last, as activity levels in 2022 varied greatly.

The .zip files attached to these recent Emotet emails contain an Office Document with macros. When the file is opened, the user is prompted to “Enable Content,” which allows the malicious macros to run. The macros will download an Emotet.dll from the internet and run it locally on the machine.

Emotet is a type of computer malware that was originally designed as a banking Trojan. The goal was to gain access to foreign devices and spy on sensitive personal information. Emotet has been known to deceive and hide from basic antivirus programs. When a computer is infected with malware, it spreads like a computer worm and attempts to infiltrate other computers on the network.

It primarily spreads via malspam, which is spam email containing malware (hence the term). To persuade users, these messages frequently use familiar branding, mimicking the email format of well-known and trusted companies such as PayPal or DHL. Once loaded, Emotet will sit quietly in the background, waiting for instructions from a remote command and control server.

Eventually, the malware will steal victims’ emails and contacts for future Emotet campaigns, or it will download additional payloads such as Cobalt Strike or other malware that frequently leads to ransomware attacks.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

March 27, 2026 Microsoft is updating GitHub Copilot to train on real-world developer interactions, expanding beyond public code datasets to more...

March 23, 2026 David Shipley, co-host of Cybersecurity today is covering RSAC for Tech Newsday and Cybersecurity Today.  SAN FRANCISCO more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn