EMOTET Botnet Returns

EMOTET Botnet Returns

After few months of absence, the botnet returns.

It’s targeting the Italian users too, and it is spreading through attached ZIP files.

The Zip file includes an Excel file and a malicious macro, within it.

Emotet-Still-Abusing-Macros-4.webp

Starting from April 2022, Microsoft had run a cover to stop and disable Excel macros code, and to stop the ability of running any files being downloaded from the Internet.If there a label “Mark-of-the-Web (MoTW)” then this is a warn that this file will open in “Protected View” mode. To prevent any execution of macros.

Today the users trust more content than the past, because they were used to use and collaborate services freely. So, the training and dealing with suspected file is very important at this time, due to our digital world era.

Related Posts

Web Application Security - Challenge-13

Web Application Security - Challenge-13

Can you get the admin cookie?

Esperienza di Tirocinio in Sorint.lab: Dalla Teoria dei SAST alla Pratica con Semgrep

Esperienza di Tirocinio in Sorint.lab: Dalla Teoria dei SAST alla Pratica con Semgrep

Dal Codice alla Sicurezza: Un Viaggio Formativo tra Teoria e Pratica

 Grazie CrowdStrike per averci ricordato a che cosa serve il Testing

Grazie CrowdStrike per averci ricordato a che cosa serve il Testing

Il caso di CrowdStrike dimostra quanto sia essenziale investire in attività di QA e testing. Questi processi non solo migliorano l'affidabilità e la sicurezza del software, ma proteggono anche le azie

Polyfill js - Another Supply Chain Attack

Polyfill js - Another Supply Chain Attack

What happens if a popular open-source JavaScript library get hacked?

Agile and Security

Agile and Security

How Agile practices can improve the shift security left approach

MongoDB RomeMUG: Meet Up #9

MongoDB RomeMUG: Meet Up #9

"Deploy an Application on MongoDB Atlas"

Automated TLS Certificate Management

Automated TLS Certificate Management

TLS Certificate

Web Application Security - Challenge-12

Web Application Security - Challenge-12

Can you trigger an XSS?