A researcher was able to exploit a vulnerability in Emotet effectively causing the malware to crash and prevent it from infecting systems for six months. James Quinn with Binary Defense developed a killswitch earlier this year, dubbed EmoCrash, that exploited a buffer overflow vulnerability found in the installation process. The news comes shortly after researchers discovered that a mysterious vigilante was fighting the threat actors behind the malware s comeback by replacing malicious payloads with whimsical GIFs and memes.
Source: https://threatpost.com/emocrash-exploit-emotet-6-months/158414/

