WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Emotet Malware Tweaks Tactics in Fresh Attack Wave
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Emotet Malware Tweaks Tactics in Fresh Attack Wave

Author: Charles Egli

Created: Thursday, February 14, 2019 - 19:07

Categories: Cybersecurity

The Emotet malware, which was responsible for deploying the Ryuk ransomware into a North Carolina water utility’s IT system in October, is back with new techniques and an upsurge in attacks. In recent campaigns, Menlo Security says 80 percent of the malicious files appear to be Word documents with a .doc extension but are actually XML files (the other 20 percent of the malicious documents sampled are Word documents containing embedded macros, as is typical of Emotet). The researchers say this twist is an effort to avoid both detection and sandbox setups, often used by security teams to reverse-engineer malware code. “This technique is probably used to evade sandboxes, since sandboxes typically use the true file type and not the extension to identify the application,” Menlo Security said. “While the true file type is XML, it is still opened in Microsoft Word at the endpoint, thereby prompting the user to enable the malicious embedded macro,” it added. In total, 10 percent of the overall sample could also not be identified as malicious by standard antivirus software. Menlo Security added that Emotet made its top list of Trojans last year and it is expected that the malware will maintain its position throughout 2019. Read the article at ZDNet.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated April 30, 2026)

Apr 30, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar