5 things to know about Emotet malware

The Cybersecurity and Infrastructure Security Agency released a notice Jan. 22 of an increase in the number of Emotet malware attacks.

Here are five things to know about the malware:

1. Emotet works like a Trojan attack, either downloading or dropping malware onto a computer or network.

2. The malware typically is spread through malicious email attachments. The hackers attempt to proliferate a network with user credentials and writing to shared drives.

3. If a hacking attack is successful, the unauthorized person could use Emotet to gain access to sensitive information, such as proprietary information and financial data.

4. Officials recommend administrators block email attachments that are commonly associated with malware and block any email attachments that can't be filtered by antivirus software.

5. Additionally, administrators can install firewall rules, antivirus programs, patch management processes and filters at the email gateway to protect themselves from the malware.

Copyright © 2024 Becker's Healthcare. All Rights Reserved. Privacy Policy. Cookie Policy. Linking and Reprinting Policy.

 

Featured Whitepapers

Featured Webinars

>