Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
European Law Enforcement Uses Customized DLL to Wipe Emotet Malware from Infected Windows PCs
Malware and Vulnerabilities
April 26, 2021
The Register
The code was distributed at the end of January to Emotet-infected computers by the malware's command-and-control (C2) infrastructure, which had just been seized in a multinational police operation.
Read More
Emotet Banking Trojan
DLL file
Emotet C2 Servers
Self-destruct mechanism
Publisher
Previous
NFC Forum specifications offer cryptology security for ...
Mobile Security
Next
Targeted ransomware attacks grow 767%, India among top ...
Trends, Reports, Analysis