• Rss
  • LinkedIn
  • Youtube
  • Twitter
  • Instagram
  • English English English en
  • Deutsch Deutsch German de
Sales: +49 5251 304-800 | Support: +49 5251 304-636
NoSpamProxy
  • HOME
  • PRODUCT
    • NoSpamProxy Cloud
    • NoSpamProxy Protection
    • NoSpamProxy Encryption
    • NoSpamProxy Large Files
    • NoSpamProxy Disclaimer
  • SUPPORT
    • Knowledge Base
    • Forum
    • Training courses
    • Support Request
    • Software-Download
    • Resources
  • PARTNERS
    • Finding Resellers
    • Becoming Reseller
    • Partner Portal
  • COMPANY
    • Team
    • Testimonials
    • Career
    • Contact
  • EVENTS
    • Events
    • Webcast Training
  • BLOG
  • FREE TRIAL VERSION
    • Price request
    • Free trial version
  • English
    • Deutsch
  • Search
  • Menu Menu
  • Emotet tot

Emotet infrastructure shattered

In a joint operation, law enforcement agencies from Germany, the Netherlands, Ukraine, Lithuania, France, as well as England, Canada and the United States have smashed the infrastructure of the Emotet malware. Emotet was previously considered the most dangerous malware in the world and in the vast majority of cases was used to extort ransom from victims.

In addition to countless private individuals, the victims included companies, healthcare facilities, government agencies and other public institutions, for example the Berlin Court of Appeal and the administration of the city of Frankfurt am Main. In addition, there were institutions such as the University of Giessen, the Catholic University of Applied Sciences in Freiburg, and the Fürth Clinic. We have reported on Emotet several times in this blog.

What is Emotet?

Emotet is a generic term for malware that infects IT systems with Trojans by means of particularly authentic-looking spam emails. In the vast majority of cases, the gateway for Emotet was email attachments, such as contaminated Word documents. The reason why the emails could look so authentic was that email contents and contact data of the victims were already read out prior to the infection and the contents of the infected email were adapted to a previous communication, for example. In addition to infecting the computer, Emotet’s main task was to download other malware, for example the ransomware Ryuk or the banking Trojan Trickbot.

According to the press release of the Federal Criminal Police Office, the action coordinated by Europol and Eurojust not only succeeded in cutting off the perpetrators’ access to the Emotet infrastructure, but in at least one case it was possible to take control of the Emotet infrastructure.

Video: Emotet takedown in the Ukraine

Source: YouTube Channel National Police Ukraine

Is Emotet emodead?

Despite this huge and important blow against cyber criminals, it may be doubted that the cyber crime scene will rest in shock. On the contrary.  Emotet operated on the principle of a bookable service: Manufacturers of banking Trojans, for example, paid to use Emotet to gain access to victims’ computers so they could plant their own malware.

The gap left by Emotet represents an ideal opportunity for other criminals to increase their influence and take over the Emotet makers’ business. There are plenty of successors to Emotet in the form of Ragnar Locker, Dharma and other malware.

Protect your IT against cyber attacks with NoSpamProxy – Try it now!

With NoSpamProxy you can reliably protect your company from cyber attacks. Request your free trial version now!

Test NoSpamProxy 30 days free of charge
  • share 
  • share 
  • tweet 
  • email 

SEARCH

PRODUCT

  • All Topics
  • NoSpamProxy Cloud
  • NoSpamProxy Protection
  • NoSpamProxy Encryption
  • NospamProxy Large Files

Knowledge Base

Knowledge Base

Note: The information in this knowledge base is only relevant for NoSpamProxy up to version 13.2. All information for NoSpamProxy 14 and higher can be found in the online documentation.

CATEGORY

  • All Topics
  • News
  • Product
  • Tech & Support
  • Events
Subscribeto RSS Feed

NoSpamProxy

  • NoSpamProxy Cloud
  • NoSpamProxy Encryption
  • NoSpamProxy Large Files
  • NoSpamProxy Disclaimer
  • Price request
  • Team
  • Career
  • General terms and conditions
  • Data Protection Information for Business Partners and Applicants
  • Cybersecurity (PSIRT)

Partners

  • Becoming a reseller
  • Partners
  • Order Certificates
  • Newsletter

Categories

  • All topics
  • News
  • Support
  • Updates
  • Order certificates

Latest News

  • Info IconCritical Outlook vulnerability: No threat to NoSpamProxy customers24.03.2023 - 15:09
  • Default filter settings in NoSpamProxy 1422.03.2023 - 10:00
  • NoSpamProxy UpdateGlobal Rollout NoSpamProxy Version 14.0.515.03.2023 - 15:20
IMPRINT • EULA • Privacy Policy • © 2023 Net at Work GmbH
  • Rss
  • LinkedIn
  • Youtube
  • Twitter
  • Instagram
32Guards offers protection against dangerous short URLsSchutz vor gefährlichen Kurz-URLsNoSpamProxy UpdateMigration tool for new GlobalSign certificates available
Scroll to top