WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Emotet Resumes Malspam Operations
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Emotet Resumes Malspam Operations

Author: Charles Egli

Created: Tuesday, September 17, 2019 - 20:09

Categories: Cybersecurity

Emotet started spewing out new spam emails yesterday after a period of inactivity that lasted nearly four months. As WaterISAC discussed in its August 27 Security and Resilience Update, researchers had observed Emotet’s command and control servers coming back to life. But the servers weren’t observed sending out new spam emails at that time, as resuming operations required time to rebuild the botnet, clean it of bots from security researchers, and prepare new spam campaigns. The latest emails contain malicious file attachments or links to malware-laced downloads. Users who receive these emails and download and execute any of the malicious files are exposing themselves to getting infected with the Emotet malware. Once infected, computers are added to the Emotet botnet. The Emotet malware on infected computers acts as a downloader for other threats. Some of Emotet’s most well-known customers are the operators of the Ryuk ransomware, which have often rented access to Emotet-infected hosts to infect enterprise networks or local governments with their ransomware strains. Case in point, the Onslow Water and Sewer Authority’s Ryuk ransomware infection began as an Emotet infection. Read the article at ZDNet.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar