Microsoft warned the Emotet trojan back on a large scale, stealing the victim's banking information
Microsoft has officially issued a warning about a massive malware attack, targeting the victim's bank information. According to the software giant, both users and companies should be extremely wary of emails with file attachments.
Tens of thousands of emails with hundreds of malicious attachments were sent, according to Microsoft. If you click on these files, the Emotet trojan will be installed on the victim's computer.

The Emotet banking Trojan was first discovered by security researchers in 2014. Initially, it was designed as a bank malware, attempting to penetrate a victim's computer to steal bank information. as well as other sensitive data. Later versions of Emotet added malware and spam distribution services, including the distribution of other banking trojans.
Emotet is equipped with functions to help avoid detection by virus scanning software. Besides, it can also spread itself to computers in the same network. The US Department of Homeland Security considers Emotet to be one of the most damaging and costly malware. Typically, it will cost about $ 1 million for each Emotet cleanup from the system of agencies, organizations and businesses.
Microsoft said the Threat Protection system had soon discovered this campaign. In addition, Office 365 ATP has long been able to detect malicious attachments and URL links in emails. Finally, Microsft Defender ATP will block malicious code from executing on the user's computer.
You should read it
- Stolen bank account with Trojan Banking
- What is a Trojan? How to avoid trojan attack?
- Azorult Trojan steals user passwords while running in the background like Google Update
- Use SEO to bring Google search results to bank trojans
- New bank trojan detection on Android Red Alert
- LokiBot - bank trojan on Android turns into ransomware when you try to delete it
- Again Trojan appeared to attack Mac OS
- Detected 4 banking trojans in 11 apps on Google Play Store
May be interested
- Shadow IoT and the dangers come from this problemthere are lots of interesting and interesting gadgets in internet of things (iot), but many of them don't have the proper security settings. this creates a problem called shadow iot, in which users can unknowingly allow hackers to gain access to the corporate network.
- Differences between hardware and software firewallsfirewalls, both hardware and software, help protect computers from hackers and other online threats, by blocking malicious data from accessing the system.
- Microsoft fixes a serious vulnerability that has existed for 17 years in Windows Serverthe vulnerability has tracking code cve-2020-1350 and its official name is sigred. it has been in windows dns server for nearly two decades and has only recently been successfully handled by the efforts of microsoft experts with help from the checkpoint security security team.
- How to check if your computer is being monitoredin today's technological age, the exploitation of personal data is much more common, there are many bad guys using computer tracking to exploit, track and steal information.
- Should we use Tor and VPN together?there is a frequent online security question regarding using tor browser and tor network with vpn (virtual private network): can you use tor and vpn at the same time?
- Use a PIN or password more secure on Windows 10?anyone can use a pin (personal identification number - personal identification number) to protect their windows 10 account. doing so is a great idea.