Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Emotet malware hits Lithuania's National Public Health Center
#1
[Image: 2eL7DfU.jpg]

The internal networks of Lithuania's National Center for Public Health (NVSC) and several municipalities have been infected with Emotet malware following a large campaign targeting the country's state institutions.

"When infected recipients opened infected messages, the virus entered the internal networks of the institutions," NVSC officials said in a statement published today.


"Infected computers, after downloading additional files, began sending fake emails or engaging in other types of malicious activity."

Lithuanian government officials, ministry representatives, and epidemiological diagnostics experts that have previously been contacted by NVSC specialists via email have all received Emotet-infected emails from infected systems.

The NVSC e-mail systems have been temporarily shut down on Tuesday to stop the further spread of the virus.

NVSC information technology specialists, together with experts from the Central State Telecommunications Center and the National Cyber Security Center currently working on cleaning affected systems of the Emotet infection, as well as on recovering NVSC e-mails and restoring email access.


Emails sent as replies to previous conversations

Rytis Rainys, Director of the Lithuanian National Cyber Security Center (NKSC), warned that the Emotet emails sent as replies to previous conversations distributed malicious code using password-protected archives as attachments, with the password shared in the email body.

This prevented anti-malware solutions from detecting the malicious emails which made it possible for the targeted individuals to open the attachment and infect themselves.

Stealing reply-chain emails is a known Emotet tactic used to camouflage malicious emails as parts of existing conversations for higher credibility and better infection rates in future spam campaigns.

The tactic is also being used by the Qbot trojan, and it was previously by the Gozi ISFB banking trojan and the URSNIF information-stealing trojan.

This is the second large Emotet campaign that has targeted Lithuania this year, with a previous one detected by the NKSC in October.

The NKSC published an advisory at the time recommending potential targets (including but not limited to state institutions and companies) to enable and properly configure Sender Policy Framework (SPF) email authentication.

Emotet is back in business

After a break of a month and a half, the Emotet botnet was revived on December 21st [1, 2], and Microsoft spotted an ongoing campaign delivering "a wide range of lures in massive volumes of emails, the use of fake replies or forwarded emails, password-protected archive attachments."

"The new Emotet campaign still uses documents that contain malicious macro that, when enabled, connects to seven malicious domains to download the Emotet payload," Microsoft Security Intelligence tweeted.

Emotet was first spotted in 2014 as a banking Trojan and has now evolved into a botnet used by the TA542 threat group (aka Mummy Spider) to deploy second-stage malware payloads on infected systems.

The payloads Emotet drops on compromised computers include the QakBot and Trickbot (which also deploys both Ryuk and Conti ransomware) trojans.

Before going on a break, Emotet has targeted multiple US state and local governments in potentially targeted campaigns according to an advisory published by DHS-CISA in October.


SOURCE
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  February 2021’s Most Wanted Malware: Trickbot Takes Over Following Emotet Shutdown Bjyda 0 1,028 03-13-2021 , 09:49 PM
Last Post: Bjyda
  Ryuk ransomware hits 700 Spanish government labor agency offices mrtrout 0 1,031 03-10-2021 , 07:38 PM
Last Post: mrtrout
  Pow! Emotet’s down. Is it out? MALWAREBYTES NEWS mrtrout 0 774 01-28-2021 , 03:28 AM
Last Post: mrtrout
  The Emotet botnet is back and hits 100K recipients per day Bjyda 0 877 12-27-2020 , 12:01 AM
Last Post: Bjyda
  Lazarus Group Hits COVID-19 Vaccine-Maker in Espionage Attack mrtrout 0 950 12-24-2020 , 06:49 AM
Last Post: mrtrout

Forum Jump:


Users browsing this thread: 1 Guest(s)