Active since 2014, initially as a banking trojan, Emotet has been a plague on the Internet in recent years. Emotet’s core strength is its ability to download other malware, thus giving those in control of it remote code execution on infected systems and networks. Emotet has been the initial infection in many high-profile attacks, in particular with ransomware
such as Ryuk
and MegaCortex.
Early in June, Emotet mysteriously ceased its activities and researchers were left guessing what happened. However, late last week the malware’s command-and-control servers became
active again
, though for now no new binaries have been served.
At
VB2019
in London,
Sophos
researcher Luca Nagy will present a thoroughly researched
paper on Emotet
, in which she studies its binary and the various modules in great detail.
Understanding a threat like Emotet would have been important even with the threat itself gone, given how many attackers use a
similar playbook
, but with the return of Emotet, Luca’s paper will be even more important.
To see this important presentation – and more than 50 others – don’t forget to
secure your place for VB2019!
And if you have some hot research to present, don’t forget the
call for last minute papers
is open until 1 September.
Leave a Reply