A large-scale Emotet campaign hit Lithuania, the malware has infected the networks of Lithuania’s National Center for Public Health (NVSC) and several municipalities.
“The National Cyber Security Center under the Ministry of National Defense recorded a large number of virus-infected e-mails addressed to several state institutions. It is currently known that Trojan.Emotet virus-infected emails have been received by several municipalities and the National Center for Public Health (NVSC).” reads the alert published by the NVSC.
The alert states that the Emotet malware infected the computers then began sending out fake emails or engaging in other types of malicious activity.
The malicious emails sent by the NVSC’s infected computers were received by the representatives of the Government of the Republic of Lithuania, ministries, as well as researchers that were contacted by the national center during epidemiological diagnostics.
The Emotet campaign uses malicious emails that attempt to trick recipients into opening the zipped archive with the password included in the message.
“We warn you that not all computer viruses can be intercepted by security systems used by organizations, because malicious code is distributed in various ways, such as archived, password-protected, and the password itself is written in a letter. Emails accessed in this way require user action: open the file, unzip it with a password. Therefore, we recommend to everyone e-mail. postal system operators to specify their security rules and filters, ”says Rytis Rainys, Director of NKSC.
In response to the infections, the NVSC has temporarily shut down its e-mail systems.
NVSC IT staff is cleaning infected systems and restoring the operations with the help of the experts from the Central State Telecommunications Center and the National Cyber Security Center.
The security advisory states that this is the second large Emotet campaign that hit Lithuania this year, the first wave of Emotet emails was recorded in October.
Experts at Cofense, the recent Emotet campaign used updated payloads and is targeting over 100,000 recipients per day.
The Emotet banking trojan has been active at least since 2014, the botnet is operated by a threat actor tracked as TA542. In the middle-August, the malware was employed in fresh COVID19-themed spam campaign
Recent spam campaigns used messages with malicious Word documents, or links to them, pretending to be an invoice, shipping information, COVID-19 information, resumes, financial documents, or scanned documents.
Emotet is a modular malware, its operators could develop new Dynamic Link Libraries to update its capabilities.
In October, the Cybersecurity and Infrastructure Security Agency (CISA) issued an alert to warn of a surge of Emotet attacks that have targeted multiple state and local governments in the U.S. since August.
If you want to receive the weekly Security Affairs Newsletter for free subscribe here.
(SecurityAffairs – hacking, Emotet)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.