Emotet the most active malware of 2018, 2019 returns after it went dark in start of 2020. After absence for few months Emotet reappeared on July 17, 2020 after it disappeared on February 7, 2020 as its head in campaigns using URLs or attachments in email messages to launch PowerShell scripts that download Emotet’s active components. Cryptolaemus a group of security researchers dedicated to detecting and tracking Emotet, have also confirmed Emotet’s comeback, along with other cyber-security firms such as CSIS, Microsoft, Malwarebytes, Abuse.ch.
The Emotet operates as an three separate three server cluster Epoch1, Epoch2 and Epoch3 an email spam infrastructure that it uses to infect end-users with the Emotet trojan. It then uses this initial foothold to deploy other malware, either for its own interest.