The Emotet malware is the most widely used malware in the cybercrime world. It is used in spam campaigns and attaches malicious files in the emails to make the devices vulnerable.
Emotet would then use infected devices to perform other spam campaigns and install other payloads, such as the QakBot (Qbot) and Trickbot malware.
These payloads would then be used to provide initial access to threat actors to deploy ransomware, including Ryuk, Conti, ProLock, Egregor, and many others.According to the reports of Bleeping Computer
Two individuals were arrested by international law enforcement agencies by Europol and Eurojust who were taking Emotet malware by storm and deploying the malware to various devices and software.
Emotet has been using TrickBot extensively and now is using a new method using Operation Reacharound which is used to upgrade the existing TrickBot’s infrastructure.
Emotet is being silent for some time and is not spamming the devices and deploying the malware. This lack of spamming activity is likely due to the rebuilding of the Emotet infrastructure from scratch and new reply-chain emails being stolen from victims in future spam campaigns.
Still, Emotet is being on rising for some time now and is being unstoppable. It is upgrading itself every few months and keeps on deploying malicious software using attachments.