WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Security Awareness – Emotet Uses Snowden’s New Book as a Current Lure
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Security Awareness – Emotet Uses Snowden’s New Book as a Current Lure

Author: Jennifer Walker

Created: Tuesday, September 24, 2019 - 14:30

Categories: Cybersecurity, General Security and Resilience, Security Preparedness

As WaterISAC shared in its September 17 Security and Resilience Update, Emotet has resumed spear phishing activity. Specifically, last week Emotet was observed using similar tactics from late spring 2019 by hijacking old email threads designed as invoices. This week it adds a different tactic to its arsenal of lures – NSA whistleblower Edward Snowden’s new book, Permanent Record. Using current events for phishing lures is very common. Emotet authors are reportedly offering Snowden’s book as a Microsoft Word attachment. According to antimalware firm Malwarebytes, the attachment is weaponized with a malicious macro launching a PowerShell command that retrieves the Emotet malware binary from a compromised WordPress site. Users who open the document will be presented with a fake message stating, “Word hasn’t been activated” and are prompted to enable the content with a yellow security warning. Once they do, nothing appears to happen. However, after infection, the machine will attempt to reach out to one of Emotet’s many command-and-control servers (C2s). Perch users subscribed to the WaterISAC Community will be able to detect the Indicators of Compromise (IoCs) for this Emotet campaign within their environments. Read the entire post at Malwarebytes

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar