Global Cybersecurity Action Takes Down Emotet Botnet; Kaspersky Hails Victorious Operation

Twitter: @edd1819, Instagram: @bluestar0910, Facebook: SDN — Science & Digital News

By EDD K. USMAN

(SDN) — Cybersecurity authorities from a number of countries have successfully taken down the Emotet botnet infrastructure.

Cybersecurity leaders considered Emotet as the most dangerous and resilient botnet on cyberspace. Until the takedown.

The law enforcement agencies and authorities involved in the international collaboration fighting cybercriminals are from the Netherlands, Germany, the United States, the United Kingdom, France, Lithuania, Canada, and Ukraine as reported by various news sites, including BleepingComputer.com.

Bleeping Computer said the authorities from various governments succeeded in the takedown of the cybercriminals’ whole infrastructure after they gained control of the Emotet servers.

“The infrastructure that was used by EMOTET involved several hundreds of servers located across the world, all of these having different functionalities in order to manage the computers of the infected victims, to spread new ones, to serve other criminal groups, and to ultimately make the network more resilient against takedown attempts,” as explained by Europol, per Bleeping Computer.

Coordinated by Europol and Eurojust, the operation, obviously after a long manhunt and global investigation in the murky depths of the Dark Web, disrupted the criminal activities of the Emotet malware.

Following the triumphant coordinated operation, Kaspersky issued statement welcoming and hailing the collaborative effort.

=========

Kaspersky Statement on Emotet Takedown 

“The group behind Emotet were one of the most aggressive cybercriminal ‘infrastructure as a service’ providers. Their customization of the malicious emails was extremely good and covered many languages besides English. They would constantly reuse older emails, subjects and threads to trick recipients into opening their malicious attachments. In a way, they perfected the initial infection stage to a very high degree, which, in our experience, tricked even knowledgeable internet users. An infection with Emotet would usually result in further malware, which many times also included ransomware; people would then lose their data, photos or documents.

=========

Bleeping Computer: Emotet botnet disrupted after global takedown operation

========

“This is possibly one of the most important recent botnet takedowns, mostly because of the physical action against the cybercriminals running Emotet. In my opinion, the coordinated move from multiple Law enforcement agencies against their network infrastructure will have a significant impact on Emotet’s ability to operate during the next months. With Emotet out of the cybercriminal ecosystem, it remains to be seen if their place will be taken by another group, or if they will be able to orchestrate a comeback, be it either as Emotet or perhaps as a merger with another group and continue from there.

“Last but not least, since Emotet were renting their infrastructure to other cybercriminal groups, pushing malware such as Trickbot, this should also impact even other cybercriminal groups’ ability to maintain and grow their botnets. The Emotet takedown will probably affect multiple cybercriminal groups and their operations beyond Emotet themselves.”

— Costin Raiu, director of Global Research and Analysis Team (GReAT) at Kaspersky

========

Global cybersecurity alliance takes down Emotet botnet.
Credit: BleepingComputer.com

Is your email compromised by Emotet?

Check if your e-mail address is present in the Emotet botnet data

“As part of an international criminal investigation, the Dutch police have seized data from the Emotet botnet. The seized data contains e-mail addresses, usernames, and passwords that are in the possession of cybercriminals. These criminals use a malware named Emotet to steal these identifiers. Emotet is a malware that distributes itself via e-mail. By using Emotet, other harmful computer viruses such as ransomware could be installed on your computer.” (Source: Check here from the Dutch police )


Meanwhile, Kaspersky is building momentum in Asia Pacific (APAC) with the appointment of a new managing director.  

Kaspersky has announced the other day the appointment of Chris Connell as managing director for the Asia-Pacific (APAC) region. Chris will spearhead the global cybersecurity company’s APAC business expansion efforts in addition to continuing his role as the deputy vice president of Global Sales for the company. Originally from the United Kingdom, he is set to be based in Kaspersky’s regional office in Singapore.

Global cybersecurity alliance takes down Emotet botnet.

Chris joined Kaspersky as the GM for United Kingdom & Ireland in February 2019. In February 2020, alongside his role as deputy VP of Sales Network, he was promoted to director of European Operations, and took on the task of boosting the performance of the company’s European operations. Following this European reorganization Chris was responsible for one of Kaspersky’s burgeoning regions – Northern and Eastern Europe. 

Overall, Chris has more than 23 years of professional experience in sales and commercial leadership in various companies and across many sectors, including solution selling, consumer, B2B and channel sales. Prior to joining Kaspersky, Chris’s career was spent at companies such as Ingram Micro Europe and Australia, Tech Data and IBM.

Kaspersky builds momentum in APAC.
Chris Connell, Kaspersky’s new APAC managing director and existing deputy VP for Global Sale. (Source: Kaspersky Philippines)

“I am excited to take up this new leadership role in a region where cybersecurity trends are dynamic but also diverse in terms of needs and development,” comments Connell.

“While we will continue to deliver tailor-made cybersecurity solutions for both businesses and consumers, it is equally important that we pivot away from the traditional and reactive ‘seek-and-destroy’ approach to an all-encompassing concept of ‘cyber-immunity’ – building an ecosystem where everything connected is protected and secure by design.”

The expansion of Chris’ role at Kaspersky as the managing director for Asia-Pacific comes at a pivotal moment for the cybersecurity ecosystem in the region, where sector spending is projected to hit US$28.2 billion by 2022.

Data breaches have become increasingly commonplace in the region, with incidents of patient records being stolen from group healthcare institutions, and privacy lapses suffered by tech giants such as online shopping and transportation companies, all occurring over the past year. 

“True cybersecurity cannot be achieved in a silo, and the key to building a cybersecurity ecosystem that breaks free from the constraints of operating in different silos is one that is built on integrated and collaborative operations. I am confident that Chris’ wealth of expertise and thorough understanding of global cybersecurity trends will help to build a safer and more transparent environment for all in APAC,” adds Evgeniya Naumova, vice president of the Global Sales Network at Kaspersky.

In his new post, Chris is expected to lend his expertise to shore up the cyber-resilience of APAC’s healthcare institutions. In addition, he will look to further develop and continue the growth in both commercial and enterprise cybersecurity, with a strong focus on threat intelligence for industry partners in the digital economy, as well as small and medium businesses (SMBs). (✓)

=========

Featured image of a malware rendering thanks to Michael Geiger on Unsplash.

One thought on “Global Cybersecurity Action Takes Down Emotet Botnet; Kaspersky Hails Victorious Operation

Don't be shy, comments are welcome! Thank you.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: