In the past, Emotet has repeatedly caused major damage to computers. Malware that is often smuggled in via fake emails!
Emotet is not a new malware, but has been known for some time
This malware has existed since 2014 and has continued to appear in newer versions since then. If the Trojan manages to install itself on a user's system, spam and phishing emails are sent from the user's account to all of the user's contacts.
Experts from Check Point® Software Technologies, a global leader in cybersecurity solutions, has released its latest Global Threat Index for November 2022. This month, Emotet – a Trojan horse malware – returned as the most widespread malware in Germany. In November, 5.81 percent of all companies recorded were affected (4.4 percent worldwide). In second place, Check Point Research (CPR) reports the banking Trojan Qbot aka Qakbot , which attacked 5.34 percent of all companies in November (4.34 percent worldwide). AgentTesla , a RAT (Remote Access Trojan), which was in second place in October, lost this position and was the third most widespread malware last month with 4.77 percent (5.89 percent worldwide).
The top 3 malware for Germany
- Emotet – Emotet is an advanced, self-propagating and modular Trojan that was once used as a banking Trojan and is currently spreading other malware or malicious campaigns. Emotet uses multiple methods to maintain persistence and evasion techniques to avoid detection and can be distributed via phishing spam emails containing malicious attachments or links.
- Qbot – Qbot, also known as Qakbot, is a banking Trojan that first appeared in 2008. It is designed to steal a user's banking information and keystrokes. Often distributed via spam emails, Qbot uses multiple anti-VM, anti-debugging, and anti-sandbox techniques to complicate analysis and evade detection.
- AgentTesla – AgentTesla is a sophisticated RAT that acts as a keylogger and password thief and has been active since 2014. AgentTesla can monitor and collect the victim's keystrokes and clipboard, capture screenshots, and exfiltrate credentials for a variety of software installed on the victim's computer (including Google Chrome, Mozilla Firefox, and Microsoft Outlook email client). AgentTesla is sold on various online markets and hacking forums. Read more here: https://ots.de/B0ZSKe
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )

