The latest version of Emotet has been making the rounds since 2014. The latest campaign includes a host of upgrades that make it hard to detect and even harder to stop. New code lets the malware grab details about victims machines, including process names and specifications, and then decides how to proceed. Users can leverage a loophole to keep their systems clear by creating new usernames or adding file clusters to force the Trojan to abort installation. Once the Trojan gains a foothold, it may compromise financial and email account information.”]

