WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home H2OSecCon 2026 Threat Awareness – Emotet Returns After Four Month Break
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partners
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – Emotet Returns After Four Month Break

Author: Jennifer Walker

Created: Tuesday, November 8, 2022 - 20:12

Categories: Cybersecurity, Security Preparedness

BleepingComputer has reported on the Emotet botnet’s reawakening after its typical hiatus. Researchers from Cryptolaemus first observed the notorious botnet’s return after a four month break. According to the group, the most recent campaigns are utilizing stolen email reply chains to distribute a malicious Excel attachment that will download the malware. One difference from prior campaigns is the inclusion of additional instructions in the Excel file informing the victim to bypass certain Windows protections, notably an attempt to bypass Microsoft’s blocking of macros by default for attachments received from outside the recipient’s organization. It also appears that Emotet is holding back a little at the moment, as researchers have not yet observed this recent campaign dropping any additional malware, as has become standard behavior with everybody’s email enemy. WaterISAC continues to track Emotet’s evolving attack chain and report on its changing tactics, including in April and June. Members are encouraged to keep abreast of Emotet activity and follow recommended guidance to protect against this everlasting adversary. Read more at BleepingComputer.

Related Resources

(TLP:CLEAR) Vulnerability Notification – Critical Zero-Day Vulnerability in Microsoft Exchange Under Active Exploitation, CVE-2026-42897

May 19, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Vulnerability Notification – Critical Vulnerability Affecting Cisco Catalyst SD-WAN, CVE-2026-20182

May 19, 2026 in Cybersecurity, Security Preparedness

Tip of the Week – May 14, 2026

May 14, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar