back to article Refreshed from its holiday, Emotet has gone phishing

Emotet is back. After another months-long lull since a spate of attacks in November 2022, the notorious malware operation that has already survived a law enforcement takedown and various periods of inactivity began sending out malicious emails on Tuesday morning. Researchers with cybersecurity firms Codefense and Cryptolaemus …

  1. Grunchy Bronze badge

    How could you find out you’re part of the botnet?

    Is there a way to figure out if I’ve got a compromised device in my midst?

    1. amanfromMars 1 Silver badge

      Re: How could you find out you’re part of the botnet?

      Is there a way to figure out if I’ve got a compromised device in my midst? ...... Grunchy

      Fortunately/Unfortunately, if targeted for SMARTR* Global Operating Device Networks, No is the only correct answer, Grunchy.

      And to spin it otherwise is delusion heaped upon hubris delivering further avenues to exploit with deeper exfiltration of prize guilty secrets and extremely damaging and self-destructive sensitive assets ... which then of course are extraordinarily rendered and universally recognised as unwelcome and damning horrendous liabilities.

      * ...... SMARTR Mentoring Analysis Reporting Titanic Research

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like