WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home H2OSecCon 2026 Threat Awareness – Emotet Up to its Old Trick(bot) and Some New Ones Too
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partners
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – Emotet Up to its Old Trick(bot) and Some New Ones Too

Author: Jennifer Walker

Created: Thursday, December 9, 2021 - 18:56

Categories: Cybersecurity

Since last month’s re-emergence of Emotet – Everybody’s Email Enemy #1 – we’ve observed its rekindling with Trickbot to spread and propensity for proliferating ransomware attacks. However, the last 10 months since its global takedown effort appear to have been time well-spent for the malware as it has come up with some new tricks. From propagating through fake software installers and improving its encryption algorithm, Emotet has recently been observed directly dropping Cobalt Strike beacons instead of relying on its old pals (Trickbot or Qakbot) to do the dirty work. This immediate Cobalt Strike deployment now gives Emotet’s threat actors more immediate network access to perform activities such as remote network surveillance or execute further commands. Members are encouraged to maintain awareness on Emotet’s ever-evolving escapades. For more on this week’s activities, visit BleepingComputer, Threatpost, and DarkReading. For a more in-depth review, system administrators are encouraged to review this recent report by CheckPoint.

Related Resources

(TLP:CLEAR) Vulnerability Notification – Critical Zero-Day Vulnerability in Microsoft Exchange Under Active Exploitation, CVE-2026-42897

May 19, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Vulnerability Notification – Critical Vulnerability Affecting Cisco Catalyst SD-WAN, CVE-2026-20182

May 19, 2026 in Cybersecurity, Security Preparedness

Tip of the Week – May 14, 2026

May 14, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar