Login | Support 24x7 Helpdesk Support 02 8011 0210 | 1300 660 368
News

Widespread Emotet malicious software targeting businesses and individuals

What’s happened?

Emotet is a banking trojan malware program which obtains financial information by injecting computer code into the networking stack of an infected Microsoft Windows computer, allowing sensitive data to be stolen via transmission. Emotet malware also inserts itself into software modules which are then able to steal address book data and perform denial of service attacks on other systems. It also functions as a down-loader or dropper of other banking Trojans.

The Australian Cyber Security Centre (ACSC) is aware of a widespread malicious email virus (malware). Known as ‘Emotet’, targeting Australian businesses and individuals.

Cybercriminals use malware for different reasons. Most commonly to steal personal or valuable information from which they can profit. It hold recipients to ransom or install damaging programs onto devices without your knowledge. Do not pay the ransom if affected by ransomware. There is no guarantee that paying. The ransom will fix your computer, and it could make you vulnerable to further attacks. Restore your files from backup and seek technical advice.

How it works

The Emotet malware appears as a normal or useful file attachment in emails (.doc, .docx, .pdf). But includes hidden code which allows cybercriminals to access and control your devices or computer systems. It can also appear as a website hyperlink in emails.

Emotet malware infects devices or computers if users click on links or open files in these emails. You know, or an organisation you deal with.

The malware forwards itself to all the users’ email contacts, increasing the likelihood of further infection.

Here is an example of one of these emails, but it can come in many different formats.

Example of Emotet phishing email

How do I stay safe?

Always use caution before opening emails and attachments, and clicking on links.

To prevent malware infection, the ACSC recommends you take the following steps immediately:

  • Disable Microsoft Office macros. (Macros are small programs used to automate simple tasks in Microsoft Office documents but can be used maliciously – visit the Microsoft website for information on disabling macros in your version of Office.)
  • Maintain firewalls.
  • Make sure you have an offline backup of your information.

If you run a business. We recommend you also alert your staff to be aware of any emails that look unusual or suspicious. Refer to ACSC advice, www.cyber.gov.au/advice/improving-staff-awareness

The ACSC has also issued advice to help organisations protect systems and customer data.

Organisations that require further assistance or advice about Emotet malware can contact the ACSC by emailing ASD.Assist@defence.gov.au

For more information, please visit: www.staysmartonline.gov.au

Leave a Reply