Supply Chain Market Research - SCMR LLC
  • Blog
  • Home
  • About us
  • Contact

Emotet – Not Egyptian

3/1/2022

0 Comments

 

Emotet – Not Egyptian
​

​On Monday Toyota (TM) shut down all of its plants in Japan because of a cyber-attack on a supplier that was linked directly to Toyota’s parts management supply system.  While Toyota was able to bring the plants back up the next day, full restoration at the digital level will take more time.  This type of cyber-attack has become more commonplace both in Japan and in other regions and is based on a piece of malware called Emotet that is considered by the US Department of Homeland Security as one of the most costly and destructive forms of malware, costing ~$1m per incident to clean up.
This malware is a Trojan that in simpler forms has been around since 2014 and was intended to be used to steal information in banking systems, but has morphed into a more flexible Trojan that looks like an e-mail or similar clickable document.  Once the document is opened, Emoet can use a number of different methods to spread across computer systems, using contact and other lists to generate e-mails that look even more realistic than the original, indicating “Your Invoice”, “Payment Details”, or an upcoming shipment from a well-known company.
Emotet is smart however and can recognize when it is in a ‘sandbox’, essentially a security tool that allows the observation of malware without letting it loose on a computer system, and it also gives the attacker the ability to upgrade the malware while it is installed on a system, giving it the ability to stay a step ahead of security trackers, which is why an attack using Emotet on the city of Allentown, PA needed Microsoft’s (MSFT) response team to come in and  clean up the mess the program caused.
While Emotet is a sophisticated piece of malware and can also be used to deliver other viruses or Trojans while it collects information or executes a ransomware attack, it is identifiable, which should keep most sophisticated computer users from accidentally infecting systems, however once it has infected a system, it can use some of the data it has collected to product even more realistic looking e-mails that are harder to recognize and easy to mistake for legitimate communication from a friend or supplier  The answer is to keep all computers updated and patched, while being extremely careful about opening any e-mail that is not easily identifiable as legitimate.  Looking at the address of the sender is at least a start and any deviation from the norm like ‘[email protected]’ or ‘[email protected]’ should keep you from being tempted, even when the e-mail looks legitimate, and it is better to have missed an e-mail than to open one that sets off a chain reaction that could shut down the production of 13,000 cars for a day or two and possibly drain your bank account or cyber wallet.
0 Comments



Leave a Reply.

    Author

    We publish daily notes to clients.  We archive selected notes here, please contact us at: ​[email protected] for detail or subscription information.

    Archives

    May 2025
    April 2025
    March 2025
    February 2025
    January 2025
    January 2024
    November 2023
    October 2023
    September 2023
    August 2023
    June 2023
    May 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    October 2020
    July 2020
    May 2020
    November 2019
    April 2019
    January 2019
    January 2018
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    November 2016
    October 2016
    September 2016

    Categories

    All
    5G
    8K
    Aapl
    AI
    AMZN
    AR
    ASML
    Audio
    AUO
    Autonomous Engineering
    Bixby
    Boe
    China Consumer Electronics
    China - Consumer Electronics
    Chinastar
    Chromebooks
    Components
    Connected Home
    Consumer Electronics General
    Consumer Electronics - General
    Corning
    COVID
    Crypto
    Deepfake
    Deepseek
    Display Panels
    DLB
    E-Ink
    E Paper
    E-paper
    Facebook
    Facial Recognition
    Foldables
    Foxconn
    Free Space Optical Communication
    Global Foundries
    GOOG
    Hacking
    Hannstar
    Headphones
    Hisense
    HKC
    Huawei
    Idemitsu Kosan
    Igzo
    Ink Jet Printing
    Innolux
    Japan Display
    JOLED
    LEDs
    Lg Display
    Lg Electronics
    LG Innotek
    LIDAR
    Matter
    Mediatek
    Meta
    Metaverse
    Micro LED
    Micro-LED
    Micro-OLED
    Mini LED
    Misc.
    MmWave
    Monitors
    Nanosys
    NFT
    Notebooks
    Oled
    OpenAI
    QCOM
    QD/OLED
    Quantum Dots
    RFID
    Robotics
    Royole
    Samsung
    Samsung Display
    Samsung Electronics
    Sanan
    Semiconductors
    Sensors
    Sharp
    Shipping
    Smartphones
    Smart Stuff
    SNE
    Software
    Tariffs
    TCL
    Thaad
    Tianma
    TikTok
    TSM
    TV
    Universal Display
    Visionox
    VR
    Wearables
    Xiaomi

    RSS Feed

Site powered by Weebly. Managed by Bluehost