The infamous piece of malware known as Emotet has begun to distribute a new module that is intended to steal credit card information that is saved in the Chrome web browser.
The event takes place in the midst of a rise in Emotet activity, which has been seen since the group was revived around the end of last year. Prior to that, it had been dormant for ten months, after a law enforcement operation that disabled its attack infrastructure in January 2021.
Emotet is still the most popular malware with a global impact of 6 percent of organizations worldwide, followed by Formbook and Agent Tesla. The malware is testing out new delivery methods using OneDrive URLs and PowerShell in.LNK attachments in order to circumvent the macro restrictions imposed by Microsoft.
The fact that the number of phishing emails, which typically involve the hijacking of already existing correspondence, increased from approximately 3,000 in February 2022 to approximately 30,000 in March 2022 as part of a mass-scale spam campaign is further evidence that the steady growth of Emotet-related threats.
As explained by We Live Security, ESET said that the number of Emotet detections increased over 11,000 percent over the first four months