Emotet botnet goes dormant for weeks or months at a time, security firm Cofense says. Security firm says new campaign uses many of the same techniques as in previous campaigns. The latest campaign starts with phishing emails, some of which leverage previous victims’ stolen data so they appear more authentic. The malware is typically hidden in malicious Word documents, zip files or URLs. The botnet has tweaked its code to better avoid detection by security tools, researchers say. By late Tuesday, Proofpoint researchers had detected more than 100,000 spamming emails written in English, German, Spanish, Italian and other languages.”]
Source: https://www.cuinfosecurity.com/emotet-botnet-returns-after-2-month-hiatus-a-15656

