2/14/2020 One of the most destructive botnets can now spread to nearby Wi-Fi networks | Ars Technica
https://arstechnica.com/information-technology/2020/02/one-of-the-most-destructive-botnets-can-now-spread-to-nearby-wi-fi-networks/ 1/5
JUMPING THE WI-FI GAP —
One of the most destructive botnets can now spread
to nearby Wi-Fi networks
Emotet's sophistication and reach continues to evolve.
- 2/12/2020, 5:26 AM
Enlarge
MarcoVerch/Flickr
DAN GOODIN
SUBSCRIBE SIGN IN
2/14/2020 One of the most destructive botnets can now spread to nearby Wi-Fi networks | Ars Technica
https://arstechnica.com/information-technology/2020/02/one-of-the-most-destructive-botnets-can-now-spread-to-nearby-wi-fi-networks/ 2/5
FURTHER READING
World’s most destructive botnet
returns with stolen passwords and
email in tow
Over the past half decade, the Emotet malware has emerged as a top Internet threat that pillages people’s bank accounts
and installs other types of malware. The sophistication of its code base and its regularly evolving methods for tricking
targets into clicking on malicious links—in September, for instance, it began a spam run that addresses recipients by name
and quotes past emails they sent or received—has allowed it to spread widely. Now, Emotet is adopting yet another way to
spread: using already compromised devices to infect devices connected to nearby Wi-Fi networks.
Last month, Emotet operators were caught using an updated version that
uses infected devices to enumerate all nearby Wi-Fi networks. It uses a
programming interface called wlanAPI to profile the SSID, signal strength, and
use of WPA or other encryption methods for password-protecting access.
Then, the malware uses one of two password lists to guess commonly used
default username and password combinations.
After successfully gaining access to a new Wi-Fi network, the infected device enumerates all non-hidden devices that are
connected to it. Using a second password list, the malware then tries to guess credentials for each user connected to the
drive. In the event that no connected users are infected, the malware tries to guess the password for the administrator of
the shared resource.
While Emotet is best known for circulating through malicious email runs, it has also been observed spreading in worm-like
fashion from device to device over infected networks. If it successfully guesses the password to a connected device, it then
loads the Emotet malware and possibly other pieces of malware—such as the Ryuk ransomware or the TrickBot malware—
Join Ars Technica and
Get Our Best Tech Stories
DELIVERED STRAIGHT TO YOUR INBOX.
Email address
SIGN ME UP
Will be used in accordance with our Privacy Policy
Enlarge / An overview of Emotet's newly discovered Wi-Fi spreader.
2/14/2020 One of the most destructive botnets can now spread to nearby Wi-Fi networks | Ars Technica
https://arstechnica.com/information-technology/2020/02/one-of-the-most-destructive-botnets-can-now-spread-to-nearby-wi-fi-networks/ 3/5
READER COMMENTS 60 SHARE THIS STORY
DAN GOODIN
Dan is the Security Editor at Ars Technica, which he joined in 2012 after working for The Register, the Associated Press, Bloomberg
News, and other publications.
EMAIL dan.goodin@arstechnica.com // TWITTER @dangoodin001
in exchange for fees paid by operators of those campaigns. No longer content with infecting only devices inside the
compromised network, Emotet is now using the newly discovered version to jump from network to network.
Beware of weak passwords
“With this newly discovered loader-type used by Emotet, a new threat vector is introduced to Emotet’s capabilities,”
researchers from security firm Binary Defense wrote in a recently published post. “Previously thought to only spread
through malspam and infected networks, Emotet can use this loader-type to spread through nearby wireless networks if the
networks use insecure passwords.”
The Binary Defense post said the new Wi-Fi spreader has a timestamp of April 2018 and was first submitted to the
VirusTotal malware search engine a month later. While the module was created almost two years ago, Binary Defense didn’t
observe it being used in the wild until last month.
The newly documented spreader underscores the importance of using strong passwords to restrict access to Wi-Fi
networks. Emotet’s previously known ability to spread from device to device within a network already underscored the
importance of using strong passwords to restrict access to devices connected to local networks. Passwords should always
be randomly generated and should never be fewer than 11 characters.
One aspect of the new Wi-Fi spreader is out of keeping with Emotet’s usual penchant for stealth of sophistication. The
module uses unencrypted connections to communicate with attacker-controlled servers. That makes it easy to detect
patterns in traffic that people can use to detect infections. The malware can also be detected through active monitoring of
connected devices for new services being installed and watching for any processes or services running from temporary files
and user profile application data folders. The Binary Defense post provides other indicators of compromise.
How do you feel about the security of your
data?
1 0 ,6 7 5 P EO P L E H AV E A N S W E R E D
Not concerned Very concerned
Share T&Cs

More Related Content

PPT
Cyber crime and security
PDF
Cyber crime and security
PDF
Malwares
PDF
Security Risks of Uneducated Employees
PPT
The Corporate Web Security Landscape
PDF
Malicious malware breaches - eScan
PPT
Combatting cyberterrorism
PPT
Virus
Cyber crime and security
Cyber crime and security
Malwares
Security Risks of Uneducated Employees
The Corporate Web Security Landscape
Malicious malware breaches - eScan
Combatting cyberterrorism
Virus

What's hot (20)

PPTX
computer virus ppt.pptx
PPT
Wong Pau Tung-special-topic-02-Virus
PDF
CIO Vietnam Talkshow 40th
PPTX
Internet security
PDF
Cyber Security | Patricia Watson
PDF
Internet threats and issues in korea 120325 eng_slideshare
PPTX
chapter 3 ethics: computer and internet crime
PPT
Beware of cyber security threats
PPTX
Cyber Security Seminar Day 2
PPTX
Wirelurker
PPTX
Seminar on Internet security
PPT
At Your Expense
PDF
Internet surfing and security
PPTX
Treads to mobile network
PDF
2015 Cybersecurity Predictions
PPT
An Advanced persistent threats
PPT
Cyber Wars And Cyber Terrorism
PPTX
Malware and it's types
PPTX
Mobile virus & worms
computer virus ppt.pptx
Wong Pau Tung-special-topic-02-Virus
CIO Vietnam Talkshow 40th
Internet security
Cyber Security | Patricia Watson
Internet threats and issues in korea 120325 eng_slideshare
chapter 3 ethics: computer and internet crime
Beware of cyber security threats
Cyber Security Seminar Day 2
Wirelurker
Seminar on Internet security
At Your Expense
Internet surfing and security
Treads to mobile network
2015 Cybersecurity Predictions
An Advanced persistent threats
Cyber Wars And Cyber Terrorism
Malware and it's types
Mobile virus & worms
Ad

Similar to One of the most destructive botnets can now spread to nearby Wi-Fi networks (20)

PDF
Emotet: A Sophisticated and Persistent Malware for Stealing Information, its ...
PPTX
Botnet
PDF
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
PDF
L017326972
PDF
Information security
DOCX
Types of Malware.docx
PPTX
CS_UNIT 2(P3).pptx
PPT
Information security in todays world
PDF
File000145
PPT
Botnet
PDF
A Review Paper on Cyber-Security
PDF
PDF
Security News bytes October 2013
PPTX
beware of Thing Bot
PPTX
Iot(security)
PDF
Secureview 4 - 2010
PPTX
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
PPTX
Mcs2453 aniq mc101053-assignment1
DOC
Ichci13 submission 104 (1)
Emotet: A Sophisticated and Persistent Malware for Stealing Information, its ...
Botnet
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
L017326972
Information security
Types of Malware.docx
CS_UNIT 2(P3).pptx
Information security in todays world
File000145
Botnet
A Review Paper on Cyber-Security
Security News bytes October 2013
beware of Thing Bot
Iot(security)
Secureview 4 - 2010
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
Mcs2453 aniq mc101053-assignment1
Ichci13 submission 104 (1)
Ad

More from Abaram Network Solutions (20)

PDF
Why Cloud Technology Is Expected To Dominate 2021
PDF
The Real Year of 5G: What it Means For Cloud Technology
PDF
10 Tips for protecting your cloud accounts
PDF
An Architect's Guide to Hybrid Cloud Storage
PDF
Cloud storage tips: Pro advice for power users
PDF
How to Optimize Cloud Storage Costs
PDF
Cloud Computing Trends in 2021: Optimization is #1 Priority
PDF
Cloud computing is the inventible future of data analytics
PDF
What does the future hold for cloud and edge computing?
PDF
How cloud-based AI is set transform mobile apps
PDF
This cutting-edge cloud-computing service is helping researchers track COVID'...
PDF
This cloud computing certification bundle is on sale for 98% off
PDF
What does the future with cloud computing look like
PDF
The Dos and Don'ts for SMB Cybersecurity in 2021
PDF
These are the top cybersecurity challenges of 2021
PDF
What's in store for cybersecurity in 2021?
PDF
5 cybersecurity predictions for 2021
PDF
How To Level Up Your Cybersecurity In 2021
PDF
The growing role of AI anf ML in cybersecurity
PDF
Top cloud computing tips of 2020
Why Cloud Technology Is Expected To Dominate 2021
The Real Year of 5G: What it Means For Cloud Technology
10 Tips for protecting your cloud accounts
An Architect's Guide to Hybrid Cloud Storage
Cloud storage tips: Pro advice for power users
How to Optimize Cloud Storage Costs
Cloud Computing Trends in 2021: Optimization is #1 Priority
Cloud computing is the inventible future of data analytics
What does the future hold for cloud and edge computing?
How cloud-based AI is set transform mobile apps
This cutting-edge cloud-computing service is helping researchers track COVID'...
This cloud computing certification bundle is on sale for 98% off
What does the future with cloud computing look like
The Dos and Don'ts for SMB Cybersecurity in 2021
These are the top cybersecurity challenges of 2021
What's in store for cybersecurity in 2021?
5 cybersecurity predictions for 2021
How To Level Up Your Cybersecurity In 2021
The growing role of AI anf ML in cybersecurity
Top cloud computing tips of 2020

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Tartificialntelligence_presentation.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Hybrid model detection and classification of lung cancer
PPTX
The various Industrial Revolutions .pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Developing a website for English-speaking practice to English as a foreign la...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A comparative study of natural language inference in Swahili using monolingua...
Group 1 Presentation -Planning and Decision Making .pptx
Benefits of Physical activity for teenagers.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
NewMind AI Weekly Chronicles – August ’25 Week III
Tartificialntelligence_presentation.pptx
1 - Historical Antecedents, Social Consideration.pdf
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Hybrid model detection and classification of lung cancer
The various Industrial Revolutions .pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
A review of recent deep learning applications in wood surface defect identifi...
Developing a website for English-speaking practice to English as a foreign la...

One of the most destructive botnets can now spread to nearby Wi-Fi networks

  • 1. 2/14/2020 One of the most destructive botnets can now spread to nearby Wi-Fi networks | Ars Technica https://arstechnica.com/information-technology/2020/02/one-of-the-most-destructive-botnets-can-now-spread-to-nearby-wi-fi-networks/ 1/5 JUMPING THE WI-FI GAP — One of the most destructive botnets can now spread to nearby Wi-Fi networks Emotet's sophistication and reach continues to evolve. - 2/12/2020, 5:26 AM Enlarge MarcoVerch/Flickr DAN GOODIN SUBSCRIBE SIGN IN
  • 2. 2/14/2020 One of the most destructive botnets can now spread to nearby Wi-Fi networks | Ars Technica https://arstechnica.com/information-technology/2020/02/one-of-the-most-destructive-botnets-can-now-spread-to-nearby-wi-fi-networks/ 2/5 FURTHER READING World’s most destructive botnet returns with stolen passwords and email in tow Over the past half decade, the Emotet malware has emerged as a top Internet threat that pillages people’s bank accounts and installs other types of malware. The sophistication of its code base and its regularly evolving methods for tricking targets into clicking on malicious links—in September, for instance, it began a spam run that addresses recipients by name and quotes past emails they sent or received—has allowed it to spread widely. Now, Emotet is adopting yet another way to spread: using already compromised devices to infect devices connected to nearby Wi-Fi networks. Last month, Emotet operators were caught using an updated version that uses infected devices to enumerate all nearby Wi-Fi networks. It uses a programming interface called wlanAPI to profile the SSID, signal strength, and use of WPA or other encryption methods for password-protecting access. Then, the malware uses one of two password lists to guess commonly used default username and password combinations. After successfully gaining access to a new Wi-Fi network, the infected device enumerates all non-hidden devices that are connected to it. Using a second password list, the malware then tries to guess credentials for each user connected to the drive. In the event that no connected users are infected, the malware tries to guess the password for the administrator of the shared resource. While Emotet is best known for circulating through malicious email runs, it has also been observed spreading in worm-like fashion from device to device over infected networks. If it successfully guesses the password to a connected device, it then loads the Emotet malware and possibly other pieces of malware—such as the Ryuk ransomware or the TrickBot malware— Join Ars Technica and Get Our Best Tech Stories DELIVERED STRAIGHT TO YOUR INBOX. Email address SIGN ME UP Will be used in accordance with our Privacy Policy Enlarge / An overview of Emotet's newly discovered Wi-Fi spreader.
  • 3. 2/14/2020 One of the most destructive botnets can now spread to nearby Wi-Fi networks | Ars Technica https://arstechnica.com/information-technology/2020/02/one-of-the-most-destructive-botnets-can-now-spread-to-nearby-wi-fi-networks/ 3/5 READER COMMENTS 60 SHARE THIS STORY DAN GOODIN Dan is the Security Editor at Ars Technica, which he joined in 2012 after working for The Register, the Associated Press, Bloomberg News, and other publications. EMAIL dan.goodin@arstechnica.com // TWITTER @dangoodin001 in exchange for fees paid by operators of those campaigns. No longer content with infecting only devices inside the compromised network, Emotet is now using the newly discovered version to jump from network to network. Beware of weak passwords “With this newly discovered loader-type used by Emotet, a new threat vector is introduced to Emotet’s capabilities,” researchers from security firm Binary Defense wrote in a recently published post. “Previously thought to only spread through malspam and infected networks, Emotet can use this loader-type to spread through nearby wireless networks if the networks use insecure passwords.” The Binary Defense post said the new Wi-Fi spreader has a timestamp of April 2018 and was first submitted to the VirusTotal malware search engine a month later. While the module was created almost two years ago, Binary Defense didn’t observe it being used in the wild until last month. The newly documented spreader underscores the importance of using strong passwords to restrict access to Wi-Fi networks. Emotet’s previously known ability to spread from device to device within a network already underscored the importance of using strong passwords to restrict access to devices connected to local networks. Passwords should always be randomly generated and should never be fewer than 11 characters. One aspect of the new Wi-Fi spreader is out of keeping with Emotet’s usual penchant for stealth of sophistication. The module uses unencrypted connections to communicate with attacker-controlled servers. That makes it easy to detect patterns in traffic that people can use to detect infections. The malware can also be detected through active monitoring of connected devices for new services being installed and watching for any processes or services running from temporary files and user profile application data folders. The Binary Defense post provides other indicators of compromise. How do you feel about the security of your data? 1 0 ,6 7 5 P EO P L E H AV E A N S W E R E D Not concerned Very concerned Share T&Cs