WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Conti Ransomware Group Potentially Behind Emotet Revival
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Conti Ransomware Group Potentially Behind Emotet Revival

Author: Alec Davison

Created: Tuesday, November 23, 2021 - 20:01

Categories: Cybersecurity

As reported last Tuesday in WaterISAC’s Security & Resilience Update, the Emotet botnet has reappeared despite the global law enforcement takedown early this year. Researchers believe this re-emergence will provide ransomware actors with initial access into compromised networks for future exploitation and follow-on attacks. Emotet was previously very successful because its “strategic, operational, and tactical agility was executed through a modular system enabling them to tailor payload functionality and specialization for the needs of specific customers,” according to Advanced Intelligence (AdvIntel). Furthermore, AdvIntel strongly believes the Conti ransomware group convinced former Emotet operators to start operating again. If true, this “partnership” is expected to give Conti an advantage over other ransomware operators if they are able to leverage Emotet’s functionality. Read more at BleepingComputer.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar