

Data From The Emotet Malware is Now Searchable in Have I Been Pwned, Courtesy of...
source link: https://www.troyhunt.com/data-from-the-emotet-malware-is-now-searchable-in-have-i-been-pwned-courtesy-of-the-fbi-and-nhtcu/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Data From The Emotet Malware is Now Searchable in Have I Been Pwned, Courtesy of the FBI and NHTCU
27 April 2021
Earlier this year, the FBI in partnership with the Dutch National High Technical Crimes Unit (NHTCU), German Federal Criminal Police Office (BKA) and other international law enforcement agencies brought down what Europol rereferred to as the world's most dangerous malware: Emotet. This strain of malware dates back as far as 2014 and it became a gateway into infected machines for other strains of malware ranging from banking trojans to credential stealers to ransomware. Emotet was extremely destructive and wreaked havoc across the globe before eventually being brought to a halt in February.
Following the takedown, the FBI reached out and asked if Have I Been Pwned (HIBP) might be a viable means of alerting impacted individuals and companies that their accounts had been affected by Emotet. This isn't the first time HIBP has been used by law enforcement in the wake of criminal activity with the Estonian Central Police using it for similar purposes a few years earlier.
In all, 4,324,770 email addresses were provided which span a wide range of countries and domains. The addresses are actually sourced from 2 separate corpuses of data obtained by the agencies during the takedown:
- Email credentials stored by Emotet for sending spam via victims' mail providers
- Web credentials harvested from browsers that stored them to expedite subsequent logins
We discussed loading these into HIBP as 2 separate incidents so they could be individually identified, but given the remediation is very similar they've been loaded in as a single "breach". Prepared in conjunction with the FBI, following is the recommended guidance for those that find themselves in this collection of data:
- Keep security software such as antivirus up to date with current definitions. I personally use Microsoft Defender which is free, built into Windows 10 and updates automatically via Windows Update.
- Change your email account password. Also change passwords and security questions for any accounts you may have stored in either your inbox or browser, especially those of higher value such as banking.
- For administrators with affected users, refer to the YARA rules released by DFN Cert, which include rules published by the German BKA.
In addition, all the old security best practices are obviously still important whether you find yourself in this incident or not: Use a password manager and create strong, unique passwords. Turn on 2 factor authentication wherever available. Keep operating systems and software patched.
I've flagged this incident as sensitive in HIBP which means it's not publicly searchable, rather individuals will either need to verify control of the address via the notification service or perform a domain search to see if they're impacted. I've taken this approach to avoid anyone being targeted as a result of their inclusion in Emotet. All impacted HIBP subscribers have been sent notifications already.
Have I Been PwnedTroy Hunt
Hi, I'm Troy Hunt, I write this blog, create courses for Pluralsight and am a Microsoft Regional Director and MVP who travels the world speaking at events and training technology professionals
Recommend
-
46
README.md Emotet research In this repository you can find documentation about the packer of Emotet and its unpacker. This unpacker extracts the command...
-
44
近日,亚信安全截获新型的EMOTET银行木马新变种,其主要通过垃圾邮件的方式进行传播,是一款比较著名且复杂的银行木马。EMOTET银行木马最早可以追溯到2014年,其主要使用网络嗅探技术窃取数据。在之后的几年里,EMOTET表现得并不活跃且慢...
-
44
概述 在奇安信威胁情报中心日常样本监控流程中发现,近期Emotet僵尸网络活动剧增。大量垃圾邮件被投放,经过溯源Emotet在今年6月份时曾经销声匿迹,C&C活动骤减,经过几个月的休整后现又卷土重来。在此提醒广大用户不要轻...
-
6
-
11
The headline is pretty self-explanatory so in the interest of time, let me just jump directly into the details of how this all works. There's been huge interest in this incident, and
-
7
Nameless Malware Discovered by NordLocker is Now in Have I Been Pwned 09 June 2021 I've had a couple of cases to date where email addresses compromised by malware then discovered in the course of investigations...
-
5
Launch HN: Secoda (YC S21) – Searchable Company Data Launch HN: Secoda (YC S21) – Searchable Company Data 44 points by E...
-
6
Ransomware Group Debuts Searchable Victim Data – Krebs on Security Cybercrime groups that specialize in stealing corporate data and demanding a ransom not to publish it have tried countless...
-
12
-
6
News FormBook knocks Emotet off top of malware chart FormBook emerged as the most widely...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK