Emotet: Difference between revisions
Crushtuoibeo (talk | contribs) No edit summary Tags: Reverted Mobile edit Mobile web edit |
low-quality LLM dump Undid revision 1244968623 by Soniaakter.mbstu (talk) |
||
(30 intermediate revisions by 22 users not shown) | |||
Line 2: | Line 2: | ||
{{use mdy dates |date=October 2020}} |
{{use mdy dates |date=October 2020}} |
||
''' |
'''Emotet''' is a [[malware]] strain and a [[cybercrime]] operation believed to be based in [[Ukraine]].<ref>{{cite news |last=Ikeda |first=Scott |date=August 28, 2020 |url=https://www.cpomagazine.com/cyber-security/emotet-malware-taken-down-by-global-law-enforcement-effort-cleanup-patch-pushed-to-1-6-million-infected-devices/ |title=Emotet Malware Taken Down By Global Law Enforcement |work= Cpomagazine |accessdate= May 1, 2021 }}</ref> The malware, also known as '''Heodo''', was first detected in 2014 and deemed one of the most prevalent threats of the decade.<ref>{{Cite web|url=https://malpedia.caad.fkie.fraunhofer.de/details/win.emotet|title=Emotet's Malpedia entry|last=|first=|date=2020-01-03|website=Malpedia|access-date=}}</ref><ref>{{Cite web|url=https://www.bleepingcomputer.com/news/security/emotet-reigns-in-sandboxs-top-malware-threats-of-2019/|title=Emotet Reigns in Sandbox's Top Malware Threats of 2019|last=Ilascu|first=Ionut|date=2019-12-24|website=Bleeping Computer|access-date=}}</ref><ref name="eurojust">{{Cite web|url=https://www.eurojust.europa.eu/worlds-most-dangerous-malware-emotet-disrupted-through-global-action|title=World's most dangerous malware EMOTET disrupted through global action|last=European Union Agency for Criminal Justice Cooperation|date=2021-01-27|website=Eurojust|access-date=}}</ref> In 2021, the servers used for Emotet were disrupted through global police action in Germany and Ukraine and brought under the control of law enforcement.<ref name="eurojust" /> |
||
First versions of the Emotet malware functioned as a banking [[Trojan horse (computing)|trojan]] aimed at stealing banking credentials from infected hosts. Throughout 2016 and 2017, Emotet operators, sometimes known as '''Mealybug''', updated the trojan and reconfigured it to work primarily as a "loader," a type of malware that gains access to a system, and then allows its operators to download additional payloads.<ref>{{Cite web|url=https://www.mcafee.com/blogs/other-blogs/mcafee-labs/emotet-downloader-trojan-returns-in-force/|title=Emotet Downloader Trojan Returns in Force|last=Christiaan Beek|date=December 6, 2017|website=McAfee |
First versions of the Emotet malware functioned as a banking [[Trojan horse (computing)|trojan]] aimed at stealing banking credentials from infected hosts. Throughout 2016 and 2017, Emotet operators, sometimes known as '''Mealybug''', updated the trojan and reconfigured it to work primarily as a "loader," a type of malware that gains access to a system, and then allows its operators to download additional payloads.<ref>{{Cite web|url=https://www.mcafee.com/blogs/other-blogs/mcafee-labs/emotet-downloader-trojan-returns-in-force/|title=Emotet Downloader Trojan Returns in Force|last=Christiaan Beek|date=December 6, 2017|website=McAfee|access-date=}}</ref> Second-stage payloads can be any type of executable code, from Emotet's own modules to malware developed by other cybercrime gangs. |
||
Initial infection of target systems often proceeds through a [[macro virus]] in an [[email attachment]]. The infected email is a legitimate-appearing reply to an earlier message that was sent by the victim.<ref name=":0" /> |
Initial infection of target systems often proceeds through a [[macro virus]] in an [[email attachment]]. The infected email is a legitimate-appearing reply to an earlier message that was sent by the victim.<ref name=":0" /> |
||
It has been widely documented that the Emotet authors have used the malware to create a [[botnet]] of infected computers to which they sell access in an [[Infrastructure as a service|Infrastructure-as-a-Service]] (IaaS) model, referred in the cybersecurity community as MaaS (Malware-as-a-Service), Cybercrime-as-a-Service (CaaS), or [[Crimeware]].<ref>{{cite web|url=https://news.sophos.com/en-us/2019/12/02/emotets-central-position-in-the-malware-ecosystem/|title=Emotet's Central Position in the Malware Ecosystem|last=Brandt|first=Andrew|date=2019-12-02|publisher=[[Sophos]]|accessdate=2019-09-19}}</ref> Emotet is known for renting access to infected computers to [[ransomware]] operations, such as the [[Ryuk (ransomware)|Ryuk]] gang.<ref>{{Cite web|url=https://www.kryptoslogic.com/blog/2019/01/north-korean-apt-and-recent-ryuk-ransomware-attacks/|title=North Korean APT(?) and recent Ryuk Ransomware attacks|last=|first=|date=|website=Kryptos Logic |
It has been widely documented that the Emotet authors have used the malware to create a [[botnet]] of infected computers to which they sell access in an [[Infrastructure as a service|Infrastructure-as-a-Service]] (IaaS) model, referred in the cybersecurity community as MaaS (Malware-as-a-Service), Cybercrime-as-a-Service (CaaS), or [[Crimeware]].<ref>{{cite web|url=https://news.sophos.com/en-us/2019/12/02/emotets-central-position-in-the-malware-ecosystem/|title=Emotet's Central Position in the Malware Ecosystem|last=Brandt|first=Andrew|date=2019-12-02|publisher=[[Sophos]]|accessdate=2019-09-19}}</ref> Emotet is known for renting access to infected computers to [[ransomware]] operations, such as the [[Ryuk (ransomware)|Ryuk]] gang.<ref>{{Cite web|url=https://www.kryptoslogic.com/blog/2019/01/north-korean-apt-and-recent-ryuk-ransomware-attacks/|title=North Korean APT(?) and recent Ryuk Ransomware attacks|last=|first=|date=January 10, 2019|website=Kryptos Logic|access-date=}}</ref> |
||
As of September 2019, the Emotet operation ran on top of three separate [[Botnet |botnets]] called Epoch 1, Epoch 2, and Epoch 3.<ref>{{cite web | url=https://www.zdnet.com/article/emotet-todays-most-dangerous-botnet-comes-back-to-life | title=Emotet, today's most dangerous botnet, comes back to life | first=Catalin | last=Cimpanu | date=2019-09-16 | publisher=[[ZDnet]] | |
As of September 2019, the Emotet operation ran on top of three separate [[Botnet |botnets]] called Epoch 1, Epoch 2, and Epoch 3.<ref>{{cite web | url=https://www.zdnet.com/article/emotet-todays-most-dangerous-botnet-comes-back-to-life/ | title=Emotet, today's most dangerous botnet, comes back to life | first=Catalin | last=Cimpanu | date=2019-09-16 | publisher=[[ZDnet]] | access-date=2019-09-19}}</ref> |
||
In July 2020, Emotet campaigns were detected globally, infecting its victims with [[TrickBot]] and [[Qbot]], which are used to steal banking credentials and spread inside networks. Some of the malspam campaigns contained malicious documents with names such as "form.doc" or "invoice.doc". According to security researchers, the malicious document launches a [[PowerShell]] script to pull the Emotet payload from malicious websites and infected machines. |
In July 2020, Emotet campaigns were detected globally, infecting its victims with [[TrickBot]] and [[Qbot]], which are used to steal banking credentials and spread inside networks. Some of the malspam campaigns contained malicious documents with names such as "form.doc" or "invoice.doc". According to security researchers, the malicious document launches a [[PowerShell]] script to pull the Emotet payload from malicious websites and infected machines.<ref>{{cite press release | url=https://www.globenewswire.com/news-release/2020/08/07/2074889/0/en/July-2020-s-Most-Wanted-Malware-Emotet-Strikes-Again-After-Five-Month-Absence.html | title=July 2020's Most Wanted Malware: Emotet Strikes Again After Five-Month Absence| date=August 7, 2020}}</ref> |
||
In November 2020, Emotet used [[Domain parking|parked domains]] to distribute payloads. |
In November 2020, Emotet used [[Domain parking|parked domains]] to distribute payloads.<ref>{{Cite web|date=2020-10-30|title=Emotet uses parked domains to distribute payloads|url=https://howtofix.guide/emotet-uses-parked-domains-to-distribute-payloads/|access-date=2021-01-27|website=How To Fix Guide|language=en-US}}</ref> |
||
In January 2021, international action coordinated by [[Europol]] and [[Eurojust]] allowed investigators to take control of and disrupt the Emotet infrastructure.<ref>{{Cite web|title=World's most dangerous malware EMOTET disrupted through global action|url=https://www.europol.europa.eu/newsroom/news/world%E2%80%99s-most-dangerous-malware-emotet-disrupted-through-global-action|access-date=2021-01-27|website=Europol|language=en}}</ref> The reported action was accompanied with arrests made in Ukraine.<ref>Cimpanu, Catalin, ''[https://www.zdnet.com/article/authorities-plan-to-mass-uninstall-emotet-from-infected-hosts-on- |
In January 2021, international action coordinated by [[Europol]] and [[Eurojust]] allowed investigators to take control of and disrupt the Emotet infrastructure.<ref>{{Cite web|title=World's most dangerous malware EMOTET disrupted through global action|url=https://www.europol.europa.eu/newsroom/news/world%E2%80%99s-most-dangerous-malware-emotet-disrupted-through-global-action|access-date=2021-01-27|website=Europol|language=en}}</ref> The reported action was accompanied with arrests made in Ukraine.<ref>Cimpanu, Catalin, ''[https://www.zdnet.com/article/authorities-plan-to-mass-uninstall-emotet-from-infected-hosts-on-april-25-2021/ Authorities plan to mass-uninstall Emotet from infected hosts on March 25, 2021]'', [[zdnet]], January 27, 2021</ref> |
||
On 14 November 2021, new Emotet samples emerged that were very similar to the previous bot code, but with a different encryption scheme that used elliptic curve cryptography for command and control communications.<ref>{{cite web|url=https://therecord.media/emotet-botnet-returns-after-law-enforcement-mass-uninstall-operation/ | title=Emotet botnet returns after law enforcement mass-uninstall operation| date=November 15, 2021|publisher=[[The Records]] | access-date=November 20, 2021}}</ref> The new Emotet infections were delivered via TrickBot, to computers that were previously infected with TrickBot, and soon began sending malicious spam email messages with macro-laden Microsoft Word and Excel files as payloads.<ref>{{cite web|url=https://isc.sans.edu/forums/diary/Emotet+Returns/28044/ | title=Emotet Returns|publisher=SANS Internet Storm Center| access-date=November 20, 2021}}</ref> |
On 14 November 2021, new Emotet samples emerged that were very similar to the previous bot code, but with a different encryption scheme that used elliptic curve cryptography for command and control communications.<ref>{{cite web|url=https://therecord.media/emotet-botnet-returns-after-law-enforcement-mass-uninstall-operation/ | title=Emotet botnet returns after law enforcement mass-uninstall operation| date=November 15, 2021|publisher=[[The Records]] | access-date=November 20, 2021}}</ref> The new Emotet infections were delivered via TrickBot, to computers that were previously infected with TrickBot, and soon began sending malicious spam email messages with macro-laden Microsoft Word and Excel files as payloads.<ref>{{cite web|url=https://isc.sans.edu/forums/diary/Emotet+Returns/28044/ | title=Emotet Returns|publisher=SANS Internet Storm Center| access-date=November 20, 2021}}</ref> |
||
On |
On 3 November 2022, new samples of Emotet emerged attached as a part of XLS files attached within email messages.<ref>{{Cite web |title=Cryptolaemus (@Cryptolaemus1) |url=https://twitter.com/Cryptolaemus1/status/1587792659275448320 |access-date=2022-11-07 |website=Twitter |language=en}}</ref>{{Self-published source|date=March 2023}} |
||
==Noteworthy infections== |
==Noteworthy infections== |
||
* [[Allentown, Pennsylvania]], city located in Pennsylvania, United States (2018)<ref>{{cite web |url=https://www.washingtontimes.com/news/2018/feb/21/malware-infection-posed-cost-1-million-allentown-p/ |title=Malware infection poised to cost $1 million to Allentown, Pa. |author=<!--Not stated--> |date= |website=washingtontimes.com |publisher=[[The Washington Times]] |access-date=November 12, 2019}}</ref><ref>{{cite web |url=https://www.zdnet.com/article/emotet-malware-gang-is-mass-harvesting-millions-of-emails-in-mysterious-campaign/ |title=Emotet malware gang is mass-harvesting millions of |
* [[Allentown, Pennsylvania]], city located in Pennsylvania, United States (2018)<ref>{{cite web |url=https://www.washingtontimes.com/news/2018/feb/21/malware-infection-posed-cost-1-million-allentown-p/ |title=Malware infection poised to cost $1 million to Allentown, Pa. |author=<!--Not stated--> |date= |website=washingtontimes.com |publisher=[[The Washington Times]] |access-date=November 12, 2019}}</ref><ref>{{cite web |url=https://www.zdnet.com/article/emotet-malware-gang-is-mass-harvesting-millions-of-emails-in-mysterious-campaign/ |title=Emotet malware gang is mass-harvesting millions of email in mysterious campaign |author=<!--Not stated--> |date= |website=[[ZDNet]] |access-date=November 12, 2019}}</ref> |
||
* [[Heise Online]], publishing house based in Hanover, Germany (2019)<ref name=":0">{{Cite web | url=https://www.heise.de/ct/artikel/Trojaner-Befall-Emotet-bei-Heise-4437807.html | title=Trojaner-Befall: Emotet bei Heise | first=Jürgen | last=Schmidt | date=June 6, 2019 | publisher=[[Heise Online]] | language=de | accessdate=November 10, 2019}}</ref> |
* [[Heise Online]], publishing house based in Hanover, Germany (2019)<ref name=":0">{{Cite web | url=https://www.heise.de/ct/artikel/Trojaner-Befall-Emotet-bei-Heise-4437807.html | title=Trojaner-Befall: Emotet bei Heise | first=Jürgen | last=Schmidt | date=June 6, 2019 | publisher=[[Heise Online]] | language=de | accessdate=November 10, 2019}}</ref> |
||
* [[Kammergericht]] Berlin, the highest court of the state of Berlin, Germany (2019)<ref>{{cite news |url=https://www.spiegel.de/netzwelt/web/emotet-berliner-kammergericht-wird-opfer-einer-trojaner-attacke-a-1289919.html |title=Emotet: Trojaner-Angriff auf Berliner Kammergericht |author=<!--Not stated--> |date= October 4, 2019|newspaper=[[Der Spiegel]] |access-date=November 12, 2019 | language=de}}</ref><ref>{{cite news |url=https://www.faz.net/aktuell/wirtschaft/diginomics/emotet-wie-ein-trojaner-das-hoechste-gericht-berlins-lahmlegte-16442702.html |title=Emotet: Wie ein Trojaner das höchste Gericht Berlins lahmlegte |author=<!--Not stated--> |date= |website=faz.net |publisher=[[Frankfurter Allgemeine Zeitung]] |access-date=November 12, 2019 | language=de}}</ref> |
* [[Kammergericht]] Berlin, the highest court of the state of Berlin, Germany (2019)<ref>{{cite news |url=https://www.spiegel.de/netzwelt/web/emotet-berliner-kammergericht-wird-opfer-einer-trojaner-attacke-a-1289919.html |title=Emotet: Trojaner-Angriff auf Berliner Kammergericht |author=<!--Not stated--> |date= October 4, 2019|newspaper=[[Der Spiegel]] |access-date=November 12, 2019 | language=de}}</ref><ref>{{cite news |url=https://www.faz.net/aktuell/wirtschaft/diginomics/emotet-wie-ein-trojaner-das-hoechste-gericht-berlins-lahmlegte-16442702.html |title=Emotet: Wie ein Trojaner das höchste Gericht Berlins lahmlegte |author=<!--Not stated--> |date= |website=faz.net |publisher=[[Frankfurter Allgemeine Zeitung]] |access-date=November 12, 2019 | language=de}}</ref> |
||
* [[Humboldt University of Berlin]], university in Berlin, Germany (2019)<ref>{{Cite web | url=https://www.heise.de/newsticker/meldung/Trojaner-greift-Netzwerk-von-Humboldt-Universitaet-an-4583300.html | title=Trojaner greift Netzwerk von Humboldt-Universität an | date=November 9, 2019 | publisher=Heise Online | work=[[Deutsche Presse-Agentur|dpa]] | language=de | accessdate=November 10, 2019}}</ref> |
* [[Humboldt University of Berlin]], university in Berlin, Germany (2019)<ref>{{Cite web | url=https://www.heise.de/newsticker/meldung/Trojaner-greift-Netzwerk-von-Humboldt-Universitaet-an-4583300.html | title=Trojaner greift Netzwerk von Humboldt-Universität an | date=November 9, 2019 | publisher=Heise Online | work=[[Deutsche Presse-Agentur|dpa]] | language=de | accessdate=November 10, 2019}}</ref> |
||
* [[Universität Gießen]], university in Germany (2019)<ref>{{Cite web | url=https://www.heise.de/security/meldung/Trojaner-Befall-Uni-Giessen-nutzt-Desinfec-t-fuer-Aufraeumarbeiten-4617154.html?wt_mc=rss.red.ho.beitrag.atom.beitrag.beitrag | title=Trojaner-Befall: Uni Gießen nutzt Desinfec't für Aufräumarbeiten | date=December 19, 2019 | accessdate=December 22, 2019 | publisher=Heise Online | language=de}}</ref> |
* [[Universität Gießen]], university in Germany (2019)<ref>{{Cite web | url=https://www.heise.de/security/meldung/Trojaner-Befall-Uni-Giessen-nutzt-Desinfec-t-fuer-Aufraeumarbeiten-4617154.html?wt_mc=rss.red.ho.beitrag.atom.beitrag.beitrag | title=Trojaner-Befall: Uni Gießen nutzt Desinfec't für Aufräumarbeiten | date=December 19, 2019 | accessdate=December 22, 2019 | publisher=Heise Online | language=de}}</ref> |
||
* Department of Justice of the province of Quebec (2020)<ref>{{Cite web|last=Joncas|first=Hugo|title=Les pirates informatiques ont pu voler tous les courriels|url=https://www.journaldemontreal.com/2020/09/12/les-pirates-informatiques-ont-pu-voler-tous-les-courriels|access-date=2021-01-27|website=Le Journal de Montréal}}</ref> |
* Department of Justice of the province of [[Quebec]] (2020)<ref>{{Cite web|last=Joncas|first=Hugo|title=Les pirates informatiques ont pu voler tous les courriels|url=https://www.journaldemontreal.com/2020/09/12/les-pirates-informatiques-ont-pu-voler-tous-les-courriels|access-date=2021-01-27|website=Le Journal de Montréal|date=September 12, 2020 }}</ref> |
||
* Lithuanian government (2020)<ref>{{Cite web|title=Several institutions affected by email virus in Lithuania – center|url=https://www.baltictimes.com/several_institutions_affected_by_email_virus_in_lithuania___center/|access-date=2021-01-27|website= |
* Lithuanian government (2020)<ref>{{Cite web|title=Several institutions affected by email virus in Lithuania – center|url=https://www.baltictimes.com/several_institutions_affected_by_email_virus_in_lithuania___center/|access-date=2021-01-27|website=[[baltictimes.com]]}}</ref> |
||
== References == |
== References == |
Latest revision as of 14:36, 2 October 2024
This article needs to be updated.(June 2022) |
Emotet is a malware strain and a cybercrime operation believed to be based in Ukraine.[1] The malware, also known as Heodo, was first detected in 2014 and deemed one of the most prevalent threats of the decade.[2][3][4] In 2021, the servers used for Emotet were disrupted through global police action in Germany and Ukraine and brought under the control of law enforcement.[4]
First versions of the Emotet malware functioned as a banking trojan aimed at stealing banking credentials from infected hosts. Throughout 2016 and 2017, Emotet operators, sometimes known as Mealybug, updated the trojan and reconfigured it to work primarily as a "loader," a type of malware that gains access to a system, and then allows its operators to download additional payloads.[5] Second-stage payloads can be any type of executable code, from Emotet's own modules to malware developed by other cybercrime gangs.
Initial infection of target systems often proceeds through a macro virus in an email attachment. The infected email is a legitimate-appearing reply to an earlier message that was sent by the victim.[6]
It has been widely documented that the Emotet authors have used the malware to create a botnet of infected computers to which they sell access in an Infrastructure-as-a-Service (IaaS) model, referred in the cybersecurity community as MaaS (Malware-as-a-Service), Cybercrime-as-a-Service (CaaS), or Crimeware.[7] Emotet is known for renting access to infected computers to ransomware operations, such as the Ryuk gang.[8]
As of September 2019, the Emotet operation ran on top of three separate botnets called Epoch 1, Epoch 2, and Epoch 3.[9]
In July 2020, Emotet campaigns were detected globally, infecting its victims with TrickBot and Qbot, which are used to steal banking credentials and spread inside networks. Some of the malspam campaigns contained malicious documents with names such as "form.doc" or "invoice.doc". According to security researchers, the malicious document launches a PowerShell script to pull the Emotet payload from malicious websites and infected machines.[10]
In November 2020, Emotet used parked domains to distribute payloads.[11]
In January 2021, international action coordinated by Europol and Eurojust allowed investigators to take control of and disrupt the Emotet infrastructure.[12] The reported action was accompanied with arrests made in Ukraine.[13]
On 14 November 2021, new Emotet samples emerged that were very similar to the previous bot code, but with a different encryption scheme that used elliptic curve cryptography for command and control communications.[14] The new Emotet infections were delivered via TrickBot, to computers that were previously infected with TrickBot, and soon began sending malicious spam email messages with macro-laden Microsoft Word and Excel files as payloads.[15]
On 3 November 2022, new samples of Emotet emerged attached as a part of XLS files attached within email messages.[16][self-published source]
Noteworthy infections
[edit]- Allentown, Pennsylvania, city located in Pennsylvania, United States (2018)[17][18]
- Heise Online, publishing house based in Hanover, Germany (2019)[6]
- Kammergericht Berlin, the highest court of the state of Berlin, Germany (2019)[19][20]
- Humboldt University of Berlin, university in Berlin, Germany (2019)[21]
- Universität Gießen, university in Germany (2019)[22]
- Department of Justice of the province of Quebec (2020)[23]
- Lithuanian government (2020)[24]
References
[edit]- ^ Ikeda, Scott (August 28, 2020). "Emotet Malware Taken Down By Global Law Enforcement". Cpomagazine. Retrieved May 1, 2021.
- ^ "Emotet's Malpedia entry". Malpedia. January 3, 2020.
- ^ Ilascu, Ionut (December 24, 2019). "Emotet Reigns in Sandbox's Top Malware Threats of 2019". Bleeping Computer.
- ^ a b European Union Agency for Criminal Justice Cooperation (January 27, 2021). "World's most dangerous malware EMOTET disrupted through global action". Eurojust.
- ^ Christiaan Beek (December 6, 2017). "Emotet Downloader Trojan Returns in Force". McAfee.
- ^ a b Schmidt, Jürgen (June 6, 2019). "Trojaner-Befall: Emotet bei Heise" (in German). Heise Online. Retrieved November 10, 2019.
- ^ Brandt, Andrew (December 2, 2019). "Emotet's Central Position in the Malware Ecosystem". Sophos. Retrieved September 19, 2019.
- ^ "North Korean APT(?) and recent Ryuk Ransomware attacks". Kryptos Logic. January 10, 2019.
- ^ Cimpanu, Catalin (September 16, 2019). "Emotet, today's most dangerous botnet, comes back to life". ZDnet. Retrieved September 19, 2019.
- ^ "July 2020's Most Wanted Malware: Emotet Strikes Again After Five-Month Absence" (Press release). August 7, 2020.
- ^ "Emotet uses parked domains to distribute payloads". How To Fix Guide. October 30, 2020. Retrieved January 27, 2021.
- ^ "World's most dangerous malware EMOTET disrupted through global action". Europol. Retrieved January 27, 2021.
- ^ Cimpanu, Catalin, Authorities plan to mass-uninstall Emotet from infected hosts on March 25, 2021, zdnet, January 27, 2021
- ^ "Emotet botnet returns after law enforcement mass-uninstall operation". The Records. November 15, 2021. Retrieved November 20, 2021.
- ^ "Emotet Returns". SANS Internet Storm Center. Retrieved November 20, 2021.
- ^ "Cryptolaemus (@Cryptolaemus1)". Twitter. Retrieved November 7, 2022.
- ^ "Malware infection poised to cost $1 million to Allentown, Pa". washingtontimes.com. The Washington Times. Retrieved November 12, 2019.
- ^ "Emotet malware gang is mass-harvesting millions of email in mysterious campaign". ZDNet. Retrieved November 12, 2019.
- ^ "Emotet: Trojaner-Angriff auf Berliner Kammergericht". Der Spiegel (in German). October 4, 2019. Retrieved November 12, 2019.
- ^ "Emotet: Wie ein Trojaner das höchste Gericht Berlins lahmlegte". faz.net (in German). Frankfurter Allgemeine Zeitung. Retrieved November 12, 2019.
- ^ "Trojaner greift Netzwerk von Humboldt-Universität an". dpa (in German). Heise Online. November 9, 2019. Retrieved November 10, 2019.
- ^ "Trojaner-Befall: Uni Gießen nutzt Desinfec't für Aufräumarbeiten" (in German). Heise Online. December 19, 2019. Retrieved December 22, 2019.
- ^ Joncas, Hugo (September 12, 2020). "Les pirates informatiques ont pu voler tous les courriels". Le Journal de Montréal. Retrieved January 27, 2021.
- ^ "Several institutions affected by email virus in Lithuania – center". baltictimes.com. Retrieved January 27, 2021.