Malicious Email Campaign Delivering Emotet Banking Trojan

NJCCIC Alert

Original Release Date: 2017-07-27

On Wednesday, July 26, the NJCCIC detected a large phishing campaign attempting to deliver malicious emails to New Jersey state employees. These emails masquerade as correspondence from mobile phone carriers and attempt to lure recipients into clicking an embedded link. If clicked, a document containing the Emotet banking trojan begins to download onto the recipient’s system. The observed emails originate from various senders and IP addresses and include the following subject lines: Your Virgin Media bill is readyAT&T Bill MessageAT&T Automatic Billing MessageAT&T Monthly Statement, and AT&T Customer. More information about this campaign and additional indicators of compromise can be found on the SANS ISC website

As this campaign has initially managed to bypass email security filters, the NJCCIC strongly recommends educating end users about this and similar threats and reminding them never to click on links or open attachments delivered with unexpected or unsolicited emails. Additionally, if end users have received and taken action on these emails, be sure to run updated antivirus software on the system to detect and remove Emotet infections and have them proactively change their passwords to any account accessed on the infected system.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.