Intelligent CISO Issue 35 | Page 23

Law enforcement and judicial authorities gained control of the infrastructure and took it down from the inside . www . intelligentciso . com
infographic
All these emails contained malicious Word documents , either attached to the email itself or downloadable by clicking on a link within the email itself . Once a user opened one of these documents , they could be prompted to ‘ enable macros ’ so that the malicious code hidden in the Word file could run and install EMOTET malware on a victim ’ s computer .
What made EMOTET so dangerous is that the malware was offered for hire to other cybercriminals to install other types of malware , such as banking Trojans or ransomwares , onto a victim ’ s computer .
Law enforcement and judicial authorities gained control of the infrastructure and took it down from the inside . The infected machines of victims have been redirected towards this law enforcementcontrolled infrastructure .
This is a unique and new approach to effectively disrupt the activities of the facilitators of cybercrime . u

Law enforcement and judicial authorities gained control of the infrastructure and took it down from the inside . www . intelligentciso . com

23