Intelligent CIO North America Issue 08 | Page 29

INFOGRAPHIC
All these emails contained malicious Word documents , either attached to the email itself or downloadable by clicking on a link within the email itself . Once a user opened one of these documents , they could be prompted to ‘ enable macros ’ so that the malicious code hidden in the Word file could run and install EMOTET malware on a victim ’ s computer .
What made EMOTET so dangerous is that the malware was offered for hire to other cybercriminals to install other types of malware , such as banking trojans or ransomware , onto a victim ’ s computer .
Law enforcement and judicial authorities gained control of the infrastructure and took it down from the inside . The infected machines of victims have been redirected towards this law enforcement-controlled infrastructure . This is a unique and new approach to effectively disrupt the activities of the facilitators of cybercrime . p
www . intelligentcio . com INTELLIGENTCIO NORTH AMERICA 29