This video belongs to the openHPI course Cyberthreats by Malware. Do you want to see more?
An error occurred while loading the video player, or it takes a long time to initialize. You can try clearing your browser cache. Please try again later and contact the helpdesk if the problem persists.
Scroll to current position
- 00:02In our OpenHPI course "Cyberthreats by Malware" now we consider Emotet.
- 00:07Emotet, that is the message in the news over the past years, Emotet has produced
- 00:13headlines in various fields
- 00:17and reported about surf results.
- 00:22Emotet attacks account for 7 percent of malware infections globally,
- 00:29based on is this Check Point's Global Threat Index
- 00:34from December 2020. So it's really a very common
- 00:39attack this Emotet.
- 00:43So far emotet has managed to infect various institutions
- 00:49around the world and this was a reason of these
- 00:54headlines because so many important institutions were infected.
- 01:01So in the last year the infection of many cities around
- 01:05the world, many cities in the US, cities in Germany
- 01:09for example Potsdam or government departments in different
- 01:15countries for example, department of justice
- 01:18in a Quebec in Canada or National Centre of Public Health in Lithuania.
- 01:26So really important institutions not only home users with eventually not
- 01:35not professionally configured systems know the attacker want to attack
- 01:40such important universities,
- 01:42important institutions in Germany, for
- 01:46example the university Gießen and then around the world other
- 01:52cities, companies, websites
- 01:55as mentioned 7 percent of all the attacks.
- 02:00What is the malware that is misused here for emotet attacks?
- 02:07This malware can be classified as a virus,
- 02:11because it needs interaction from the user
- 02:14to infect the system and spread over.
- 02:19Usually it spreads via emails, emails with malicious
- 02:25attachments, or links to malicious website,
- 02:32to malicious URLs. And when the user opens this attachment, when
- 02:39the user follows a link
- 02:42to the website, then the user gets infected.
- 02:47It has to be actively accessed/ opened by the user, this is like
- 02:53in case of virus the user has to do something and before this malware
- 02:59could start to do its work.
- 03:03What kind of actions
- 03:05are taken by emotet?
- 03:07In regard to the actions taken by this malware, emotet could not be
- 03:14specifically classified. So in the way it
- 03:19gets started is virus, but in its action it has many
- 03:24components from different types of malware.
- 03:28It serves as a staging malware and will thus be used by deliver
- 03:33further kinds of malware to the target system. So
- 03:39part of this infection is to install more and more other malware component,
- 03:47and this could vary from trojans, ransomware, scareware, keylogger,.
- 03:55So emoete is able to to
- 03:59work with all these components, take care to get this component.
- 04:04And this makes it so dangerous compared to usual spam email,
- 04:11because emotet spam emails are dangerous because they appear
- 04:17to be very very realistic. So the
- 04:22cybercriminals take care that it's not
- 04:26immediately detected as a spam email, it looks very realistic.
- 04:32Then after the infection, emotet collects data from the user's email account,
- 04:40the contacts with whom the user communicates, the content which
- 04:47are the current the user is discussing, is communicating about,
- 04:52this can be received from the email subject, from the email contents,
- 04:57and from the data from that collected data.
- 05:02Then the user an information is sent, the spam email is created
- 05:10to the user that emotet then uses such kind of
- 05:15detailed information
- 05:17to send further emails, like in the sphere of phishing from
- 05:22the infected email accounts to other users, for example emotet
- 05:27gets the information here out of the contact list of the email
- 05:33with whom the user is contacting, so the next user
- 05:37gets exactly with this background information
- 05:41an infected email from a trusted email \ and he opens
- 05:50the attached document or follows a link, then although this system of this
- 05:55neighbor is infected.
- 05:57The spam emails from the emotet therefore look very realistic, so many people
- 06:04trust it because in this way it is prepared to know specific information
- 06:12which people think no one else could know only my colleague or
- 06:17my family member. So here are
- 06:21some examples of emotet.
- 06:25There is the hijacked users email account,
- 06:29this is used as sender of the email.
- 06:33So someone is spoofing you, remember this is an attack method
- 06:38to work with such a stored sender address,
- 06:43in that case when the email system of a user is
- 06:48spied out, his or her email address is used to send
- 06:55the infected email to another user who is in contact with
- 07:02this user which is already
- 07:05infected. Then the subject of the previous email, so although this
- 07:11looks very trustworthy, no one else would know that the mail was sent
- 07:16here in that case some
- 07:20things that need to be done in HPI. Then
- 07:24most important for the attackers, the malicious link.
- 07:30The malicious link to open something, to open the attached
- 07:34document or to get a special information, and in the moment the user
- 07:39follows this links, this is the actions that needed
- 07:43to get infected. Then here there is email signature from the hijacked user,
- 07:50also this looks very realistic, and then comes the content
- 07:56from previous messages in the conversations those people
- 08:02thinks that is a new message and it's a real message it's not
- 08:06detected that is a message from the attacker.
- 08:11Here are some other emotet
- 08:14examples, so Amazon order, or something from DHL, a message
- 08:21which says we deliver you
- 08:24this and there is a link, the malicious link
- 08:28which leads to the infection of the system .Or here are all information,
- 08:35there are sender numbers and the links,
- 08:41all of the buttons, if these are used, if the links
- 08:46are activated then all these are links in the emotet mails
- 08:53which
- 08:56lead to the malicious target and
- 09:00cause the infection of the system.
- 09:06So it's very realistic, so people follow this, people
- 09:10click this link and then also their system is
- 09:14infected, so this makes emotet so dangerous.
- 09:20How you can recognise such a phishing email?
- 09:25You should be very careful, you should be suspicious of mails
- 09:31that you do not expect.
- 09:35Then if there is a personal salutation,
- 09:40missing so it's only starts the mail with "Hello" or "Dear customer",
- 09:46this could be a hint that this is not coming from a claimed
- 09:53sender and it is an infected message.
- 09:56Or wrong languages languages, for example you use Amazon that's
- 10:03English but the received email is in German language because the
- 10:11attacker put together the pieces they got from the former emails and
- 10:17how they want to
- 10:22design their mail as something as an order for amazon authors.
- 10:27Then typos, typos or wrong information, misinformations,
- 10:32these are
- 10:37typical things in such a phishing mail, if it's
- 10:42not correctly designed.
- 10:48Or another way you can detect this phishing email is the
- 10:53parent sender address is not consistent with the real technical sender.
- 11:01So it is possible with an email that there is a field
- 11:04that misses sendr address, but you can see that
- 11:10this is a only fake, because behind you can also see the real sender address
- 11:19Then strange link targets, this is
- 11:25eventually the most obvious
- 11:29point which helps you to detect that this is an emotet phishing
- 11:34email and not a real one.
- 11:37When you move the pointer over a link,
- 11:41over an image button in the email and wait for the tooltip,
- 11:47when the tooltip appears it will contain the real link target.
- 11:55And if you see there is a difference between the real link target and
- 12:00the displayed link, then definitely you should not click
- 12:05because this is the most
- 12:09obvious way that this is a
- 12:12spam mail, phishing mail from an attacker and not the real one.
- 12:16So i repeat move with your mouse to the
- 12:23link and wait and then the tooltip shows you
- 12:28the real link which is
- 12:32integrated in the document. And if there's a difference between
- 12:38the real link which is implemented in the document and the
- 12:44shown link then you can be sure that is an attack
- 12:51email, the cybercriminals want to force you to click and to get infected
- 12:58with emotet.
To enable the transcript, please select a language in the video player settings menu.