{"id":117587,"date":"2020-12-24T09:22:36","date_gmt":"2020-12-24T17:22:36","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2020\/12\/emotet-returns-to-hit-100k-mailboxes-per-day"},"modified":"2020-12-24T09:22:36","modified_gmt":"2020-12-24T17:22:36","slug":"emotet-returns-to-hit-100k-mailboxes-per-day","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2020\/12\/emotet-returns-to-hit-100k-mailboxes-per-day","title":{"rendered":"Emotet Returns to Hit 100K Mailboxes Per Day"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/emotet-returns-to-hit-100k-mailboxes-per-day.jpg\"><\/a><\/p>\n<p>Just in time for the Christmas holiday, Emotet is sending the gift of Trickbot.<\/p>\n<p>After a lull of nearly two months, the Emotet botnet has returned with updated payloads and a campaign that is hitting 100, 000 targets per day.<\/p>\n<p>Emotet started life as a banking trojan in 2014 and has continually evolved to become a full-service threat-delivery mechanism. It can install a collection of malware on victim machines, including information stealers, email harvesters, self-propagation mechanisms and ransomware. It was last seen in volume <a href=\"https:\/\/threatpost.com\/emotet-email-dnc-volunteers\/159758\/\">in October<\/a>, targeting volunteers for the Democratic National Committee (DNC); and before that, it became <a href=\"https:\/\/threatpost.com\/emotet-returns-in-malspam-attacks-dropping-trickbot-qakbot\/157604\/\">active in July<\/a> after a five-month hiatus, dropping the Trickbot trojan. Before that, in February, it was seen in a campaign that <a href=\"https:\/\/threatpost.com\/sms-attack-spreads-emotet-bank-credentials\/153015\/\">sent SMS messages<\/a> purporting to be from victims\u2019 banks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Just in time for the Christmas holiday, Emotet is sending the gift of Trickbot. After a lull of nearly two months, the Emotet botnet has returned with updated payloads and a campaign that is hitting 100, 000 targets per day. Emotet started life as a banking trojan in 2014 and has continually evolved to become [\u2026]<\/p>\n","protected":false},"author":396,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,45],"tags":[],"class_list":["post-117587","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-finance"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/117587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/396"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=117587"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/117587\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=117587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=117587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=117587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}