FacebookInstagramTwitterContact

 

You-C1000 Basketball Cup 2025           >>           Prizes Presentation for Golf Club Championship           >>           Pop-Up Market and Blood Donation Campaign           >>           Miscellaneous Offences Act 2021           >>           Nationwide 'Operasi Bersih Sepadu'           >>           Visit to UBD Botanical Research Centre           >>           Excise Order 2006           >>           17th MSME Empowerment Series Workshop           >>           Attend Singapore Youth Festival           >>           Ilal Hijrah Celebration, Wargamas Association           >>          

 

SHARE THIS ARTICLE




REACH US


GENERAL INQUIRY

[email protected]

 

ADVERTISING

[email protected]

 

PRESS RELEASE

[email protected]

 

HOTLINE

+673 222-0178 [Office Hour]

+673 223-6740 [Fax]

 



Upcoming Events





Prayer Times


The prayer times for Brunei-Muara and Temburong districts. For Tutong add 1 minute and for Belait add 3 minutes.


Imsak

: 04:34 AM

Subuh

: 04:44 AM

Syuruk

: 06:09 AM

Doha

: 06:33 AM

Zohor

: 12:22 PM

Asar

: 03:48 PM

Maghrib

: 06:34 PM

Isyak

: 07:49 PM

 



The Business Directory


 

 



Security & Privacy


  Home > Security & Privacy


International Law Enforcement Disrupts The Notorious Emotet Botnet


Andrew Brookes via Getty Images

 


 January 28th, 2021  |  11:13 AM  |   487 views

ENGADGET

 

Many crooks used Emotet to install ransomware.

 

The international community has once again taken down a major botnet. Law enforcement and courts in the US, Canada and several European countries have disrupted the infrastructure for Emotet, billed as one of the world’s “most dangerous” botnets. While officials were unsurprisingly quiet about their exact methods, they took down Emotet “from the inside” and redirected victim devices to infrastructure authorities controlled — a “unique” approach, Europol said.

 

Emotet earned its notoriety through both its ubiquity and sophistication. First found in 2014, it used an automated process to deliver malware through infected Word document email attachments. The botnet relied on “hundreds” of servers worldwide fulfilling different roles, and the malware itself frequently evaded antivirus tools by changing its code every time it was put into action. It was unusually resilient against takedowns until now.

 

Cybercriminals often used Emotet as a way to breach defenses, paying to compromise a computer using the botnet before they installed ransomware, Trojans and other hostile code. The operators behind Ryuk and the recently disrupted Trickbot have relied on Emotet in the past.

 

This won’t put an end to botnets, and it won’t be surprising if another network takes Emotet’s place. Even so, the takedown and the novel method behind it suggest that it might be more difficult for these botnets to survive in the future without more advanced defenses of their own.

 


 

Source:
courtesy of ENGADGET

by Jon Fingas

 

If you have any stories or news that you would like to share with the global online community, please feel free to share it with us by contacting us directly at [email protected]

 

Related News


Lahad Datu Murder: Remand Of 13 Students Extende

 2024-03-30 07:57:54

Dalai Lama Confirms He Will Have A Successor After His Death

 2025-07-03 01:29:33

Heathrow Considering Legal Action Against National Grid Over Fire

 2025-07-03 02:12:45