WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Awareness – Emotet Employing New Tactics to Evade Detection and Infect more Victims
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – Emotet Employing New Tactics to Evade Detection and Infect more Victims

Author: Alec Davison

Created: Tuesday, January 24, 2023 - 19:33

Categories: Cybersecurity

Once again, the infamous Emotet malware re-emerges with new evasion tactics to increase its chances of remaining undetected and propagate to more victims. As a reminder, successful Emotet attacks typically lead to the delivery of additional malware, including ransomware.

Emotet developers, who spread the malware primarily via phishing campaigns, are constantly updating and adapting its attack chain. Two of the latest tactics being utilized by Emotet include a new Server Message Block (SMB) spreader module used to conduct lateral movement and an information stealer specific to Google Chrome that targets financial information. In addition to this, “new Emotet variants have now moved from 32bit to 64bit, as another method for evading detection,” according to BlackBerry. Lastly, security researchers have observed Emotet campaigns utilizing stolen email reply chains to distribute a malicious Excel attachment that will download the malware. As WaterISAC reported in November, the difference from prior campaigns is the inclusion of additional instructions in the Excel file informing the victim to bypass certain Windows protections, notably an attempt to bypass Microsoft’s default blocking of macros for attachments received from outside the recipient’s organization. WaterISAC continues to track Emotet and its ever-changing tactics, including in April and June of last year. Members are encouraged to keep abreast of Emotet activity and follow recommended guidance to protect against this enduring threat. Read more at BlackBerry.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar