Emotet Testing New Delivery Ideas After Microsoft Disables VBA Macros by Default,
The threat actor behind the prolific Emotet botnet is testing new attack methods on a small scale before co-opting them into their larger volume malspam campaigns, potentially in response to Microsoft’s move to disable Visual Basic for Applications (VBA) macros by default across its products.
Calling the new activity a « departure » from the group’s typical behavior, ProofPoint alternatively
Calling the new activity a « departure » from the group’s typical behavior, ProofPoint alternatively
,
The threat actor behind the prolific Emotet botnet is testing new attack methods on a small scale before co-opting them into their larger volume malspam campaigns, potentially in response to Microsoft’s move to disable Visual Basic for Applications (VBA) macros by default across its products.
Calling the new activity a « departure » from the group’s typical behavior, ProofPoint alternatively
Calling the new activity a « departure » from the group’s typical behavior, ProofPoint alternatively
, ,
https://thehackernews.com/2022/04/emotet-testing-new-delivery-ideas-after.html