TA542 Brings Back Emotet with Late September Spike

  /     /     /  
Publicated : 23/11/2024   Category : security


TA542 Brings Back Emotet with Late September Spike


Overall volumes of banking Trojans and RATs increased during the third quarter, when Emotet was suspiciously absent until mid-September.



Emotet re-emerged toward the end of September, ending a months-long hiatus that gave banking Trojans and remote access Trojans (RATs) room to increase in the third quarter.
As a result of Emotets absence for the first 10 weeks of the third quarter, global combined malicious URL and attachment message volume decreased by nearly 40%, researchers explain in the Proofpoint Q3 2019 Threat Report. Despite this decline, overall volumes of banking Trojans and RATs increased by 18% and 55%, respectively, compared with the second quarter. Banking Trojans made up 46% of all malware in the third quarter, followed by RATs at 15%.
Emotets absence was notable because of its sheer size. Between mid-2017 and May 1, 2019, TA542 spread the Emotet botnet in hundreds of increasingly large campaigns that eventually spread through North and South America, Western Europe, Asia, and the Middle East, targeting organizations across industries with tens of millions of messages. Over time, Emotet evolved from banking Trojan to a modular botnet designed to spread different types of digital threats.
Emotet disappeared from the threat landscape at the end of May, shifting overall malware trends. To some extent, researchers say, banking Trojans and RATs in the third quarter were filling the gap Emotet left. Threat groups that Proofpoint tracked as TA556 and TA544 drove banking Trojan volumes with large Ursnif campaigns, which made up 20% of all banking Trojans. Other attackers distributed Trickbot (37%), and a group tracked as TA516 spread IcedID (26%).
More attackers regularly distributed RATs in Emotets absence – namely, a group tracked as TA505. We noticed TA505 is a group that moves the needle, says Chris Dawson, threat intelligence lead at Proofpoint. When they choose to distribute a threat, they do it in volumes. In the third quarter, it led the charge with FlawedAmmyy (45%) and FlawedGrace (30%).
Emotets reappearance in September brought another shift: When it emerged for the last two weeks of the month, it made up 11% of all malicious payloads for the entire third quarter. Their absence impacted overall volume significantly, says Dawson of Emotets temporary exit from cybercrime. Now theyre back with a vengeance, doing what they do.
There remains some speculation in the intelligence community as to where Emotet went and what its operators were doing, he explains. When major actors take a short break, its usually because they lost control of the botnet or need to do some retooling behind the scenes. But Emotets hiatus was long – a little over three months – and its unclear why its actors went dark.
When TA542 re-emerged with new Emotet campaigns on September 16,
researchers noticed
a few subtle shifts in how it operated. The group generally followed the same model researchers had historically observed: geographically targeted emails with local-language lures and brands. Messages often had financial themes and contained malicious attachments or links to malicious documents that, when targets enabled macros, installed Emotet onto their machines.
But in addition to its longstanding targets, which included the US, the UK, Canada, Germany, and Australia, TA542 expanded its target countries to include Italy, Spain, Japan, Hong Kong, and Singapore. It also used a Snowden lure in its email campaigns, going back to its older 2018 habit of using seasonal and topical email lures. Before it dropped off the map, Dawson says, it was using generic business-based lures in its attack messages.
It says something more about how we see social engineering get better and better, he explains, noting how even high-volume actors are getting smarter about geofencing and localization of languages when they craft malicious messages.
Related Content:
8 Tips for More Secure Mobile Computing
Kaspersky Analysis Shines Light on DarkUniverse APT Group
What a Security Products Blacklist Means for End Users & Integrators
The Uphill Battle of Triaging Alerts
Check out 
The Edge
, Dark Readings new section for features, threat data, and in-depth perspectives. Todays top story:
What a Security Products Blacklist Means for End Users and Integrators
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
TA542 Brings Back Emotet with Late September Spike