WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Security Awareness – Emotet Propagating via Fake Software Installers
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Security Awareness – Emotet Propagating via Fake Software Installers

Author: Alec Davison

Created: Thursday, December 2, 2021 - 18:53

Categories: Cybersecurity

The nefarious Emotet malware, which recently reappeared, continues to evolve its propagation methods. The malware is now being delivered by malicious Windows App Installer packages that profess to be Adobe PDF software. WaterISAC previously reported on the reemergence of this malware that spreads via phishing emails and malicious attachments, and often leads to ransomware attacks. The threat actors behind Emotet are currently compromising systems by installing malicious software using a built-in feature of Windows 10 and Windows 11 called App Installer. Using information from security researchers, BleepingComputer has mapped this new Emotet campaign. The scam begins with stolen reply email chains that ask users to click on a link that says “Please see attached.” After clicking the link, the user is brought to a fake Google Drive page that asks them to click on “Preview PDF.” Once users agree to open the PDF, a window opens prompting users to install the “Adobe PDF Component.” Members are encouraged to share this recent tactic with users as part of security awareness reminders. Read more at BleepingComputer.

Related Resources

Members Only

(TLP:GREEN) WaterISAC’s Annual Member Needs Survey – 2026

May 7, 2026 in Cybersecurity, Natural Disasters, Physical Security
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar