Express Computer
Home  »  News  »  Seqrite detects 8000 daily Emotet intrusions targeting Indian enterprises

Seqrite detects 8000 daily Emotet intrusions targeting Indian enterprises

0 369

Seqrite , a specialist security provider has highlighted the rapid evolution of the Emotet malware. Having previously highlighted the sudden spurt in Emotet-based attacks, Seqrite has mapped how the malware has transformed from a banking Trojan to an advanced threat distribution platform since its launch to emerge as the biggest security threat to the Indian business.

Emotet was first discovered in 2014 as a banking Trojan meant for stealing sensitive financial information from infected endpoints. However, the Trojan has evolved overtime through continuous upgradations and new distribution techniques to become the biggest security threat for businesses. From 2018, Emotet has become a pain for enterprises because of its polymorphic, self-updating and spreading capabilities making it virtually impossible to detect through traditional antivirus. With the help of its indigenously developed platform, GoDeep.AI, Seqrite has been successfully detecting more than 8,000 daily intrusions of Emotet, protecting its customers from this advanced threat. The sheer number of detections proves that the malware is rising in popularity and has turned into a hot threat distribution platform for cybercriminals.

Researchers at Seqrite further observed that, due to an effective combination of persistence and network propagation technique, malware authors use infected systems strategically to achieve multiple objectives. They first steal user credentials, then use these credentials to gain access to user accounts to spam more users and further spread the malicious code. Finally, they deploy other malware such as Qakbot, TrickBot, and Ryuk Ransomware on the Emotet-infected system to maximise the damage.

The most recent evolution of the Emotet malware, as identified by Seqrite, also has the ability to hijack existing email threads and insert a malicious link or infected file into, without changing the conversation content of the threads. Emails are then sent out from the infected endpoint, spoofed to give the impression that they have been drafted by one of the correspondents. Any unsuspecting user who clicks on the infected link or downloads the infected file then has a second self-executable copy of Emotet created on their systems through random combinations, using a pre-defined list of words.

Any breach, in this case, can not only expose this sensitive information for cybercriminals to exploit, but may also have long-term repercussions for the victims. By piercing through the outer defences and infiltrating other advanced malware into networks and systems, Emotet can leave target organisations vulnerable to more sophisticated attacks. On top of the financial sanctions mandated by data protection regulations such as the EU-GDPR, such a coordinated large-scale breach might also lead to the complete erosion of brand equity in the market.

Speaking on the findings, Sanjay Katkar, Joint Managing Director and Chief Technology Officer, Quick Heal Technologies Limited, said, “Having started out as a banking Trojan in 2014, Emotet’s evolution over the last five years is as alarming as it is stunning. It is today amongst the most dangerous malware of our times and major implications for enterprises across India. A single breach can be used as an entry point into multiple networks and systems, potentially compromising data and disrupting processes on a scale that we haven’t seen before. This is a wake-up call for Indian enterprises to adopt cutting-edge cybersecurity solutions.”

Seqrite advises to conduct employee awareness programmes around Emotet and implement robust cybersecurity and data protection measures. Any mails containing attachments must also be scanned for malware before opening. Downloaded documents should also not have macros enabled, or opened in the editing mode, without first scanning them for malicious codes. All systems and software must be kept up-to-date, while two-factor authentication secure protocols for email access and communication.

To protect themselves and their critical resources against advanced threats such as Emotet, security experts at Seqrite advise Indian enterprises to adopt a multi-layered approach by deploying solutions such as Endpoint Security, Unified Threat Management (UTM), and Secure Web Gateway (SWG). It is also recommended to deploy mobile-oriented security measures such as Enterprise Mobile Management (EMM), as well as data protection solutions such as Data Encryption and Data Loss Prevention (DLP).

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 

Stay updated with News, Trending Stories & Conferences with Express Computer
Follow us on Linkedin
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image