Security researchers report a recent resurgence in activity related to Emotet malware. Cisco Talos says it has seen increased activity targeting US military domains and US government domains. Another campaign targeted at some 600 U.N. staffers targeted with an attachment that would download the malware. The malware is typically concealed in PDF documents, malicious links, or rogue Word documents. Every single Ryuk ransomware incident that Check Point Software investigated in 2019, in fact, involved Emoet, Check Point said. The threat has been described as among the most destructive and costly malware ever.”]