The Australian Cyber Security Centre (ACSC) is aware of a widespread malicious email virus (malware), known as ‘Emotet’, targeting Australian businesses and individuals.
How it works
The Emotet malware appears as a normal or a useful file attachment in emails (doc., docx., PDF), but includes hidden code which allows access and control of your devices or computer systems. It can also appear as a website hyperlink in emails.
Emotet malware infects devices or computers if users click on links or open files in these emails, which are sent as phishing emails to make them look like they come from someone you know, or an organization you deal with.
Once a user account is infected, the malware forwards itself to all the users’ contacts, increasing the likelihood of further infection.
Here is an example of one of these emails, but it can come in many different formats.
How do I stay safe?
Always use caution before opening emails and attachments, and clicking on links.
To prevent malware infection, the ACSC recommends you take the following steps immediately:
– Disable Microsoft Office macros. Macros are small programs used to automate simple tasks in Microsoft Office documents but can be used maliciously; visit the Microsoft website for information on disabling macros in your version of Office, or ask your IT provider.
– Maintain firewalls.
– Make sure you have an offline backup of your information.
If you run a business, we recommend you also alert your staff to be aware of any emails that look unusual or suspicious. Refer to ACSC advice: https://www.cyber.gov.au/advice/improving-staff-awareness
The ACSC has also issued advice to help protect systems and customer data.
An organization that require further assistance or advice about Emotet malware can contact the ACSC by emailing ASD.Assist@defence.gov.au
Why do they do it?
use malware for different reasons, most commonly to steal personal or valuable information from which they can profit, hold recipients to ransom or install damaging programs onto devices without your knowledge. Do not pay the ransom if affected by . There is no guarantee that paying the ransom will fix your computer, and it could make you vulnerable to further attacks. Restore your files from backup and seek technical advice.
The information provided here is of a general nature. Everyone’s circumstances are different. If you require specific should contact your local technical support provider.
Please contact Chill IT if you require any advice or technical support.