WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Awareness – Emotet, Everybody’s Email Enemy (Re)Emerges and Could Lead to More Ransomware
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – Emotet, Everybody’s Email Enemy (Re)Emerges and Could Lead to More Ransomware

Author: Jennifer Walker

Created: Tuesday, November 16, 2021 - 19:19

Categories: Cybersecurity, Security Preparedness

There are few things that are absolute. Cyber threats being fully eradicated isn’t one of them. Despite the globally coordinated law enforcement action in January and follow up mass uninstall effort in April to expunge this formidable foe, Emotet has awoke. Teaming up with its’ old pal, Emotet has been observed using TrickBot’s existing infrastructure to rebuild – with over 264 infected devices already acting as command and control servers at the time of this writing. As Emotet regenerates, there hasn’t been any spamming activity observed yet. However, analysis reveals that Emotet has evolved. The current version is reported to employ 7 commands (versus its previous 3-4) and is expected to lead to a surge in ransomware infections. Prior to the takedown, Emotet was adept at deploying multiple ransomware families, including Ryuk, Conti, ProLock, Egregor, and many more. To proactively defend against Emotet, members are encouraged to track and block its command and control servers. Associated IP addresses can be found on a list maintained by the malware tracking group Abuse.ch. For more, including defense tactics, read more at BleepingComputer.

Related Resources

(TLP:CLEAR) WaterISAC Notification – CISA Issues Cyber Alert ​​for Supply Chain Compromise Impacting Axios Node Package Manager​

Apr 20, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated April 17, 2026)

Apr 17, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

(TLP:CLEAR) Claude Mythos Preview: The AI Inflection Point in Vulnerability Management

Apr 16, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar