{"id":25252,"date":"2019-02-14T12:33:48","date_gmt":"2019-02-14T12:33:48","guid":{"rendered":"http:\/\/c36912ff-f427-4d60-9193-9a709c3b1e8c"},"modified":"2019-02-14T12:33:48","modified_gmt":"2019-02-14T12:33:48","slug":"emotet-malware-tweaks-tactics-in-fresh-attack-wave","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\/","title":{"rendered":"Emotet malware tweaks tactics in fresh attack wave"},"content":{"rendered":"<p>The Emotet Trojan, a thorn in the side of financial institutions and your average individual alike, is back with new techniques and an upsurge in attacks.<\/p>\n<p>According to researchers <a href=\"https:\/\/www.menlosecurity.com\/blog\/emotet-a-small-change-in-tactics-leads-to-a-spike-in-attacks\" target=\"_blank\" rel=\"noopener noreferrer\">from Menlo Security<\/a>, since mid-January 2019, Emotet has been used in a rapid stream of campaigns which have evolved to infect even more systems.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>Emotet was first discovered back in 2014 and is now considered one of the most destructive and insidious financial Trojans in existence.<\/p>\n<p>Once known simply as an individual, self-propagating Trojan with little to recommend itself, the threat actors behind the malware, dubbed Mealybug, have created a malware-as-a-service business based on the Trojan in recent years &#8212; pivoting the malware to <a href=\"https:\/\/www.zdnet.com\/article\/panda-trojan-becomes-part-of-emotet-threat-distribution-platform\/\" target=\"_blank\">a threat distribution platform<\/a> available to other cyberattackers.<\/p>\n<p>The modular Emotet software now usually acts as a distribution and packing system for other malicious payloads, but is also able to brute-force computer systems, generate Business Email Compromise (BEC) messages in compromised accounts for the purposes of spam campaigns, create backdoors, and steal financial data.<\/p>\n<p>In recent years, Emotet has been observed in the wild deploying the IcedID banking Trojan, Trickybot, Ransom.UmbreCrypt, and <a href=\"https:\/\/www.zdnet.com\/article\/panda-trojan-becomes-part-of-emotet-threat-distribution-platform\/\" target=\"_blank\">Panda Banker<\/a>.<\/p>\n<p>A 2018 US-CERT <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA18-201A\" target=\"_blank\" rel=\"noopener noreferrer\">security advisory<\/a> dubbed Emotet to be &#8220;among the most costly and destructive malware affecting state, local, tribal, and territorial (SLTT) governments, and the private and public sectors.&#8221;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>Trend Micro researchers warned in November that Emotet now <a href=\"https:\/\/www.zdnet.com\/article\/emotet-malware-runs-on-a-dual-infrastructure-to-avoid-downtime-and-takedowns\/\" target=\"_blank\">utilizes dual infrastructures<\/a> and a variety of command-and-control (C2) servers to better protect itself against takedown attempts.<\/p>\n<p>In recent campaigns, Menlo Security says that malicious documents containing Emotet are being distributed via URLs hosted on threat actor-owned infrastructure as well as traditional spam email attachments.<\/p>\n<p>As shown below, Emotet has been tracked in recent months in attacks against healthcare, finance, and the insurance industry, among others.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2019\/02\/14\/b33a05b7-b83b-4c97-8e31-9354cc6ec656\/1f7009f96c728ed6af522926d4086cf3\/screenshot-2019-02-14-at-09-25-39.png\" class=\"\" alt=\"screenshot-2019-02-14-at-09-25-39.png\"\/><\/span><\/p>\n<p><strong>See also:\u00a0<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/one-in-three-enterprises-cant-avoid-data-breaches\/\" target=\"_blank\">One in three enterprises can&#8217;t protect themselves from data breaches<\/a><\/p>\n<p>While 20 percent of the malicious documents sampled were Word documents containing embedded macros as is typical of Emotet, the other 80 percent appeared to be Word documents with a .doc extension &#8212; but were actually XML files.<\/p>\n<p>The researchers say this twist has appeared in an effort to avoid both detection and sandbox setups, often used by security teams to reverse-engineer malware code.<\/p>\n<p>&#8220;This technique is probably used to evade sandboxes, since sandboxes typically use the true file type and not the extension to identify the application, they need to run in inside the sandbox,&#8221; Menlo Security said. &#8220;While the true file type is XML, it is still opened in Microsoft Word at the endpoint, thereby prompting the user to enable the malicious embedded macro.&#8221;<\/p>\n<p><strong>TechRepublic:\u00a0<\/strong><a href=\"https:\/\/www.techrepublic.com\/article\/how-to-protect-and-secure-your-web-browsing-with-the-brave-browser\/\" target=\"_blank\" rel=\"noopener noreferrer\">How to protect and secure your web browsing with the Brave browser<\/a><\/p>\n<p>In total, 10 percent of the overall sample could also not be identified as malicious by standard antivirus software.\u00a0<\/p>\n<p>The researchers said that in some of the documents viewing the contents of macros were disabled and VBA Projects &#8212; created in Excel &#8212; were locked, which the team believes was potentially an attempt to &#8220;thwart the analysis of the macro&#8217;s contents.&#8221;<\/p>\n<p>&#8220;In the past, we have seen Emotet being delivered through regular macro-infested Word documents, but this technique of disguising an XML document as a Word document seems to be a recent change in the delivery technique,&#8221; Menlo says. &#8220;With such constant changes in tactics from the Emotet threat actors, we foresee that this campaign will continue to evolve and become more sophisticated.&#8221;<\/p>\n<p><strong>CNET:\u00a0<\/strong><a href=\"https:\/\/www.cnet.com\/news\/government-watchdog-finds-weak-enforcement-in-us-privacy-regulations\/\" target=\"_blank\" rel=\"noopener noreferrer\">Government watchdog finds weak enforcement of US privacy regulations<\/a><\/p>\n<p>The company added that Emotet made its top list of banking Trojans last year and it is expected that the malware will maintain its position throughout 2019.<\/p>\n<p>On Wednesday, Cybereason&#8217;s Nocturnus Research team discussed new developments <a href=\"https:\/\/www.zdnet.com\/article\/this-new-malware-exploits-bugs-in-antivirus-software-to-steal-your-data\/\" target=\"_blank\">in the Astaroth Trojan<\/a>, of which the malware has been given the capability to abuse processes in legitimate antivirus software to steal personal and sensitive data.\u00a0<\/p>\n<h3>Previous and related coverage<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/emotet-trojan-tweaks-tactics-in-fresh-attack-wave\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The threat distribution platform has introduced a new method to snare the unsuspecting.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25253,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-25252","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Emotet malware tweaks tactics in fresh attack wave 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emotet malware tweaks tactics in fresh attack wave 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-14T12:33:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/emotet-malware-tweaks-tactics-in-fresh-attack-wave.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1196\" \/>\n\t<meta property=\"og:image:height\" content=\"784\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Emotet malware tweaks tactics in fresh attack wave\",\"datePublished\":\"2019-02-14T12:33:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\\\/\"},\"wordCount\":653,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/emotet-malware-tweaks-tactics-in-fresh-attack-wave.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\\\/\",\"name\":\"Emotet malware tweaks tactics in fresh attack wave 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/emotet-malware-tweaks-tactics-in-fresh-attack-wave.png\",\"datePublished\":\"2019-02-14T12:33:48+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/emotet-malware-tweaks-tactics-in-fresh-attack-wave.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/emotet-malware-tweaks-tactics-in-fresh-attack-wave.png\",\"width\":1196,\"height\":784},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emotet malware tweaks tactics in fresh attack wave\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emotet malware tweaks tactics in fresh attack wave 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\/","og_locale":"en_US","og_type":"article","og_title":"Emotet malware tweaks tactics in fresh attack wave 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-14T12:33:48+00:00","og_image":[{"width":1196,"height":784,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/emotet-malware-tweaks-tactics-in-fresh-attack-wave.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Emotet malware tweaks tactics in fresh attack wave","datePublished":"2019-02-14T12:33:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\/"},"wordCount":653,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/emotet-malware-tweaks-tactics-in-fresh-attack-wave.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\/","url":"https:\/\/www.threatshub.org\/blog\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\/","name":"Emotet malware tweaks tactics in fresh attack wave 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/emotet-malware-tweaks-tactics-in-fresh-attack-wave.png","datePublished":"2019-02-14T12:33:48+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/emotet-malware-tweaks-tactics-in-fresh-attack-wave.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/emotet-malware-tweaks-tactics-in-fresh-attack-wave.png","width":1196,"height":784},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/emotet-malware-tweaks-tactics-in-fresh-attack-wave\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Emotet malware tweaks tactics in fresh attack wave"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25252"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25252\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25253"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}