WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Attached to Emotet
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Attached to Emotet

Author: Jennifer Walker

Created: Thursday, July 30, 2020 - 16:01

Categories: Cybersecurity

As reported in the Security & Resilience Update on July 21, Emotet has arisen after its nearly six month snooze. At first it did not seem to be exhibiting any discernable new behavior as is typical for an Emotet awakening. But after more in-depth analysis researchers have since identified a new module designed to steal attachments. This attachment stealing module is another arrow in Emotet’s quiver to appear authentic to its victims. According to Cryptolaemus, a group that tracks Emotet, the malware now steals 131072 byte or smaller attachments with email contents, later to be used as part of reply chains. Similar to its previous campaigns, Emotet has been distributing emails disguised as payment reports, invoices, employment opportunities, and shipping information.

On an admirable note, an avenger has been exasperating Emotet, turning some of its distribution sites into a bit of an ‘e-meme-tet’ by replacing malicious payloads with memes and GIFs. Despite Emotet’s enduring inner-workings, malware researcher Kevin Beaumont noted in December 2019 how Emotet’s infrastructure is rather insecure, including right down to password reuse – it seems threat actors suffer from similar perpetual password pitfalls as everyone else. This lingering password deficiency is a plausible reason for the recent vigilante justice. And while this has put a crimp in its action, it is not likely to be Emotet’s endgame. Read more about Emotet’s new attachment stealing module at BleepingComputer

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar