5 things to know about Emotet malware

The Cybersecurity and Infrastructure Security Agency released a notice Jan. 22 of an increase in the number of Emotet malware attacks.

Advertisement

Here are five things to know about the malware:

1. Emotet works like a Trojan attack, either downloading or dropping malware onto a computer or network.

2. The malware typically is spread through malicious email attachments. The hackers attempt to proliferate a network with user credentials and writing to shared drives.

3. If a hacking attack is successful, the unauthorized person could use Emotet to gain access to sensitive information, such as proprietary information and financial data.

4. Officials recommend administrators block email attachments that are commonly associated with malware and block any email attachments that can’t be filtered by antivirus software.

5. Additionally, administrators can install firewall rules, antivirus programs, patch management processes and filters at the email gateway to protect themselves from the malware.

More articles on cybersecurity:
Health systems should update computer systems in wake of Iran tensions, H-ISAC says
3 cybersecurity predictions for 2020
Former NYC hospital employee pleads guilty to hacking coworkers’ emails

At the Becker's 11th Annual IT + Revenue Cycle Conference: The Future of AI & Digital Health, taking place September 14–17 in Chicago, healthcare executives and digital leaders from across the country will come together to explore how AI, interoperability, cybersecurity, and revenue cycle innovation are transforming care delivery, strengthening financial performance, and driving the next era of digital health. Apply for complimentary registration now.

Advertisement

Next Up in Cybersecurity

Advertisement

Comments are closed.