请输入您要查询的百科知识:

 

词条 Emotet
释义

  1. References

{{Expand section|date=June 2017}}Emotet[1] is a banking trojan malware program which obtains financial information by injecting computer code into the networking stack of an infected Microsoft Windows computer,[2]allowing sensitive data to be stolen via transmission.[3] Emotet malware also inserts itself into software modules which are then able to steal address book data and perform denial of service attacks on other systems.[4] It also functions as a downloader or dropper of other banking Trojans.[1]

Emotet has evolved in its delivery, however the most prominent form has been inserting malicious documents or URL links inside the body of an email sometimes disguised as an invoice or PDF attachment.[5]

First reported in Germany, Austria, and Switzerland in 2014, the United States quickly followed suit encountering Emotet malware not necessarily through fake invoices, but rather through malicious JavaScript (.JS) files; when the malicious .JS files are executed, Emotet malware is then able to infect the current host.[6]

Once Emotet has infected a host, a malicious file that is part of the malware is able to intercept, log, and save outgoing network traffic via a web browser leading to sensitive data being compiled to access the victim's bank account(s).[7]

Emotet is a member of the Feodo Trojan family of trojan malware.[8] When run in a virtual machine environment, Emotet changes its behavior in ways that are intended to mislead malware investigators.[9]

References

1. ^{{Cite web|url=https://www.us-cert.gov/ncas/alerts/TA18-201A|title=Emotet Malware – Alert (TA18-201A)|date=2018-07-20|publisher=US-CERT}}
2. ^{{Cite web|url=http://www.securityweek.com/emotet-banking-malware-steals-data-network-sniffing|title="Emotet" Banking Malware Steals Data Via Network Sniffing|last=Kovacs|first=Eduard|date=June 30, 2014|website=www.securityweek.com|language=en|archive-url=|archive-date=|dead-url=|access-date=2017-05-22}}
3. ^{{cite web|last1=Shulmin|first1=Alexey|title=The Banking Trojan Emotet: Detailed Analysis|url=https://securelist.com/the-banking-trojan-emotet-detailed-analysis/69560/|website=Securelist|accessdate=14 June 2017}}
4. ^{{Cite news|url=https://www.cyber.nj.gov/threat-profiles/trojan-variants/emotet|title=Emotet|last=|first=|date=April 26, 2017|work=New Jersey Cybersecurity & Communications Integration Cell|access-date=2017-05-22|archive-url=|archive-date=|dead-url=|publisher=State of New Jersey|language=en-US|via=}}
5. ^{{cite web|title=Emotet Changes TTPs and Arrives in United States|url=https://www.cisecurity.org/emotet-changes-ttp-and-arrives-in-united-states/|website=Center for Internet Security|accessdate=14 June 2017}}
6. ^{{cite web|last1=Masters|first1=Greg|title=Emotet banking trojan debuts in U.S.|url=https://www.scmagazine.com/emotet-banking-trojan-debuts-in-us/article/654652/|website=SC Media|accessdate=14 June 2017}}
7. ^{{cite web|last1=Salvio|first1=Joio|title=New Banking Malware Uses Network Sniffing for Data Theft|url=http://blog.trendmicro.com/trendlabs-security-intelligence/new-banking-malware-uses-network-sniffing-for-data-theft/#|website=Trend Micro|accessdate=14 June 2017}}
8. ^{{Cite web|url=https://www.cisecurity.org/emotet-changes-ttp-and-arrives-in-united-states/|title=Emotet Changes TTPs and Arrives in United States|website=www.cisecurity.org|language=en-US|access-date=2017-05-22}}
9. ^{{Cite web|url=https://securelist.com/analysis/publications/69560/the-banking-trojan-emotet-detailed-analysis/|title=The Banking Trojan Emotet: Detailed Analysis - Securelist|last=Shulmin|first=Alexey|date=April 9, 2015|website=securelist.com|archive-url=|archive-date=|dead-url=|access-date=2017-05-22}}

1 : Malware

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/24 0:28:47