Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
Last seen in January 2021, after law enforcement took them down, Emotet is back and is using TrickBot to install Emotet malware on infected Windows systems. TrickBot is a malware botnet that is often used by cyber criminals to load secondary malware payloads and commonly seen in ransomware incidents .
After 10 months of darkness, Emotet was recently seen by cyber security researcher, Brad Duncan, spamming multiple email campaigns to infect devices with the malware. The campaigns use reply-chain emails to persuade victims into opening malicious attachments disguised as Word/Excel documents or password-protected ZIP files. Reply-chain email attacks are another form of social engineering where the attacker sends a malicious email from a genuine, but stolen email account. Some of the reply-chain emails Duncan discovered included a missing wallet, a canceled meeting, and even political donations.
Currently, there are two malicious documents being distributed. The first document is an Excel attachment asking the victim to click on “Enable Content” to view the contents. The other is a Word attachment that says the document is in “Protected” mode and users must enable content and editing to view it. However, after the victim opens the attachments and click, they enable malicious macros that launch a PowerShell command that then downloads the Emotet loader DLL from a compromised WordPress site.
After being downloaded, Emotet configures a startup value under the following:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
This is done so the malware can launch when Windows starts. Emotet will then run silently in the background, waiting for commands to execute to from its C2. The commands could be used steal email account information, spread the malware to other computers, or to install additional payloads like TrickBot. Emotet was once considered the largest botnet cyber security had ever seen, let’s not give it a reason to regain its title. Keep your organization from becoming another victim by staying educated on cyber security best practices.
Emotet, once the world's most dangerous malware, is back | ZDNet
Here are the new Emotet spam campaigns hitting mailboxes worldwide (bleepingcomputer.com)
Emotet botnet disrupted after global takedown operation (bleepingcomputer.com)
Emotet Command and Control Servers - AlienVault - Open Threat Exchange