WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home H2OSecCon 2026 Emotet Malware Tweaks Tactics in Fresh Attack Wave
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partners
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Emotet Malware Tweaks Tactics in Fresh Attack Wave

Author: Charles Egli

Created: Thursday, February 14, 2019 - 19:07

Categories: Cybersecurity

The Emotet malware, which was responsible for deploying the Ryuk ransomware into a North Carolina water utility’s IT system in October, is back with new techniques and an upsurge in attacks. In recent campaigns, Menlo Security says 80 percent of the malicious files appear to be Word documents with a .doc extension but are actually XML files (the other 20 percent of the malicious documents sampled are Word documents containing embedded macros, as is typical of Emotet). The researchers say this twist is an effort to avoid both detection and sandbox setups, often used by security teams to reverse-engineer malware code. “This technique is probably used to evade sandboxes, since sandboxes typically use the true file type and not the extension to identify the application,” Menlo Security said. “While the true file type is XML, it is still opened in Microsoft Word at the endpoint, thereby prompting the user to enable the malicious embedded macro,” it added. In total, 10 percent of the overall sample could also not be identified as malicious by standard antivirus software. Menlo Security added that Emotet made its top list of Trojans last year and it is expected that the malware will maintain its position throughout 2019. Read the article at ZDNet.

Related Resources

(TLP:CLEAR) Vulnerability Notification – Critical Zero-Day Vulnerability in Microsoft Exchange Under Active Exploitation, CVE-2026-42897

May 19, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Vulnerability Notification – Critical Vulnerability Affecting Cisco Catalyst SD-WAN, CVE-2026-20182

May 19, 2026 in Cybersecurity, Security Preparedness

Tip of the Week – May 14, 2026

May 14, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar