Of many threats in today's cyber landscape, banking malware has remained a constant presence. Banking malware like Emotet steals login credentials from a victim's Windows computer, and criminals use this information to empty bank accounts. As an information stealer, Emotet doesn't bark, but it sure packs a financial bite! Security researchers continue to find new samples on a near-daily basis, and victims most often receive Emotet through malicious spam. This presentation reviews Emotet banking malware, discusses its distribution methods, and illustrates how potential victims can be bitten by this information-stealing malware. The talk concludes with best practices to avoid this increasingly common threat.
After 21 years of classified intelligence work for the US Air Force, Brad transitioned to cyber security in 2010, and he is a currently a Threat Intelligence Analyst for Palo Alto Networks Unit 42. Brad specializes in network traffic analysis. He is also a handler for the Internet Storm Center (ISC) and has posted more than 100 diaries at isc.sans.edu. Brad routinely blogs technical details and analysis of infection traffic at www.malware-traffic-analysis.net, where he provides traffic analysis exercises and over 1,300 malware and pcap samples to a growing community of information security professionals.
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek