Despite having started as a “simple” banking trojan about six years ago, Emotet has been evolving and has recently rolled back into the city , remaining an active threat .

This timeline, courtesy of researchers at Proofpoint , shows some of the development behind Emotet. Avast Threat Labs researchers say that Emotet is also interesting for its obfuscation methods — including being one of the earlier malware samples to utilize polymorphic code — and for its use of multiple botnet infrastructures.
In 2020, Emotet sprung back with a campaign earlier on in the year that delivered almost 2,000,000 phishing emails. In July, another campaign launched, sending 250,000 phishing emails mainly to users in the US and UK. Researchers at Malwarebytes have samples of those emails and more details on that campaign specifically.
U.S.'s CISA released an alert earlier this year with best practices for organizations and admins to protect themselves.
For more information on Emotet and how threat researchers are workting together to fight it, see the full write-up here , and stay safe everyone.
@Avast_Business
13 Spice ups
will1559
(Marvinthedepressedrobot)
2
Ooooo its becoming self aware. Joking. Sounds like someone found something that worked and wanted to improve upon it. Why re-invent the wheel right. I think with advancements in tech people test a number of things out. Unfortunately its not always with good intentions.