February 24, 2020 By David Bisson 2 min read

Security researchers discovered a new variant of the Emotet malware family that employed a wireless local area network (WLAN) as its distribution method.

Binary Defense spotted this WLAN distribution method in a self-extracting RAR file containing two binaries. First, it used “worm.exe” as a setup file to prepare its Wi-Fi spreading activity. The executable analyzed by researchers contained a timestamp of April 16, 2018, which would suggest that attackers have been spreading Emotet via Wi-Fi for close to two years. Even so, Binary Defense’s data indicated that Emotet might not drop its worm.exe binary too frequently.

The campaign leveraged worm.exe to enumerate all Wi-Fi devices enabled on the local computer and to profile all existing Wi-Fi networks. At that point, it launched into its brute-forcing connection loops to try to connect to a network, enumerate all devices and brute-force passwords for all users. When successful, the campaign moved to “service.exe,” a binary that it used to create a connection with its command-and-control (C&C) server and ultimately drop an embedded Emotet executable.

A Look Back at Emotet’s Recent Activity

The attack described above is one of the latest episodes in Emotet’s ongoing evolution. In December 2019, for instance, Cisco Talos witnessed a surge of activity in which the malware family used emails to target individuals in the U.S. military and government. In February 2020, IBM X-Force reported that malicious actors used SMS messages to masquerade as banks in an attempt to deliver Emotet.

How to Defend Against WLAN Distribution Tactics

Security professionals can help defend against malware campaigns that use WLANs for distribution by changing the default passwords on their routers and enabling multifactor authentication (MFA) whenever possible. Given Emotet’s frequent use of malicious email attachments as an infection vector, infosec personnel should also implement proper logging with their security information and event management (SIEM) team to monitor for the activation of malicious macros.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today