Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: Emotet

Banking Trojan Techniques: How Financially Motivated Malware Became InfrastructureBanking Trojan techniques conceptual image
66,432
people reacted

Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure

  • By Or Chechik
  • October 31, 2022 at 6:00 AM

15

10 min. read

Emotet Summary: November 2021 Through January 2022A conceptual image representing phishing - one of the primary delivery methods for Emotet malware, covered here.
50,684
people reacted

Emotet Summary: November 2021 Through January 2022

  • By Brad Duncan
  • May 17, 2022 at 6:00 AM

22

13 min. read

Trending

  • Unit 42 Attack Surface Threat Research: Constant Change in Cloud Contributes to 45% of New High/Critical Exposures Per Month by Unit 42
  • Threat Group Assessment: Muddled Libra (Updated) by Unit 42
  • Wireshark Tutorial: Display Filter Expressions by Brad Duncan
  • Wireshark Tutorial: Changing Your Column Display by Brad Duncan
  • Threat Group Assessment: Turla (aka Pensive Ursa) by Unit 42
New Emotet Infection MethodA conceptual image representing phishing, such as the research on a new Emotet infection method covered here.
69,034
people reacted

New Emotet Infection Method

  • By Saqib Khanzada, Tyler Halfpop, Micah Yates and Brad Duncan
  • February 15, 2022 at 6:00 AM

24

5 min. read

Emotet Command and Control Case StudyA conceptual image representing the concept of malware, such as that covered in this case study of Emotet Command and Control traffic.
41,272
people reacted

Emotet Command and Control Case Study

  • By Chris Navarrete and Yanhui Jia
  • April 9, 2021 at 12:00 PM

13

9 min. read

Attack Chain Overview: Emotet in December 2020 and January 2021A conceptual image representing malware, such as Emotet, discussed in this blog.
29,924
people reacted

Attack Chain Overview: Emotet in December 2020 and January 2021

  • By Chris Navarrete, Yanhui Jia, Matthew Tennis, Durgesh Sangvikar and Rongbo Shao
  • March 8, 2021 at 6:00 AM

19

11 min. read

Case Study: Emotet Thread Hijacking, an Email Attack TechniqueThis illustration represents the concept of malicious email, such as those involved in Emotet thread hijacking.
74,344
people reacted

Case Study: Emotet Thread Hijacking, an Email Attack Technique

  • By Brad Duncan
  • September 23, 2020 at 6:00 AM

28

5 min. read

APAC’s Compromised Domains Fuel Emotet Campaign
37,210
people reacted

APAC’s Compromised Domains Fuel Emotet Campaign

  • By Vicky Ray
  • December 4, 2019 at 6:00 AM

11

5 min. read

52,539
people reacted

Malware Team Up: Malspam Pushing Emotet + Trickbot

  • By Brad Duncan
  • July 18, 2018 at 5:00 AM

9

7 min. read

42,497
people reacted

Abusing the Service Control Manager to Establish Persistence for Non-Service Applications

  • By Dominik Reichel
  • December 18, 2017 at 1:00 PM

3

3 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.