WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Emotet Effectively Exhausted – Uninstall Command Executed on April 25
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Emotet Effectively Exhausted – Uninstall Command Executed on April 25

Author: Jennifer Walker

Created: Tuesday, April 27, 2021 - 17:25

Categories: Cybersecurity

The uninstall code planted by the German Bundeskriminalamt (BKA) federal police agency instructing Emotet to uninstall from roughly one million remaining infected systems executed on Sunday. This action cleans up the Windows registry key that enabled the Emotet modules to run automatically and stops and deletes associated services, but does not remove other files, nor does it erase additional malware that might have been installed through the botnet. According to BleepingComputer, there may be some uncertainty whether the removal operation also included devices located in the U.S. The eradication of Emotet, including mention of the uninstall command, was previously posted in the Security & Resilience Update for January 28, 2021. Emotet may be exterminated, but its remnants such as Trickbot, Ryuk, and Qakbot may still remain on infected systems. And while the end of Emotet is encouraging, its legacy will likely live on in the evildoers that seek to rise and replace it, like BazarCall and IcedID.

Utilities who may not have addressed latent Emotet and associated infections before the execution can find out if they are impacted via Troy Hunt’s Have I Been Pwned (HIBP) service. According to Troy, this incident is not publicly searchable in HIPB, so individuals will either need to verify control of the address via the notification service or perform a domain search to see if they’re impacted. All impacted HIBP subscribers have been sent notifications. Read more at BleepingComputer.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar