Cyber threat researchers from HP Wolf Security recently released its first quarter report, specifically identifying Emotet spam campaigns as the most common malware family identified. The team found a "27-fold increase in detections resulting from Emotet," which made up nine percent of all malware detected.
Threat analysts think the recent increase in Emotet malware is a sign that rather than departing the scene, Emotet's operators are "building back their strength and investing in growing the botnet."
There is also a growing use of HTML files to smuggle malware past email gateways, as well as an increase in Visual Basic script attacks (fileless attacks), both of which are adept at eluding detection. Some threat actors are designing Emotet malware campaigns to set off a chain of multiple infections on one device, which extends access to the victim's system.
To reduce exposure to this malware risk, security experts advise organizations to develop a "layered approach" to securing system endpoints, and focus on those areas through which systems become infected - email, browsers, and downloads. "Emotet becomes most common malware family in Q1 2022" www.securitymagazine.com (May 12, 2022).