Assurance et réassurance
Over the past few weeks, we have identified a number of organisations and government agencies impacted by a new generation of a previously seen banking trojan malware: called Emotet. Given the widespread nature of this attack and significant impact, we are issuing this public update.
There are a number of technical indicators of compromise which confirm the presence of Emotet. However, practically speaking, organisations will usually first become aware that they are impacted by the presence of malicious emails being sent to internal employees and external clients from an external sender, purporting to be the organisation.
The malicious email will usually contain an email trail of a previous conversation, with a document attached taking various forms (.doc, .docx, .pdf). Once the document is opened, malware will propagate throughout the recipient's network. In short: DO NOT OPEN ATTACHMENT.
If opened, the attack rapidly spreads. This is because content of emails from the mailbox of the user that opened the attachment are scraped, and emails are then automatically forwarded to all parties to those emails, containing the same malicious attachment. We have seen this wave of malicious spam continue even after the affected organisation has secured their own environment and removed Emotet from their systems meaning that the risk of third party infection as a result of an organisation being hit continues to persist.
In addition to malicious spam activity, we are also seeing Emotet used to install other forms of malware such as Trickbot, or deploy ransomware strains such as Ryuk.
It has been publically reported that the public and private health service industry in Victoria has been heavily impacted.
Beyond the 19 publically reported incidents, we have seen a number of organisations impacted throughout Australia, New Zealand and the wider APAC region, across a range of different sectors including, healthcare, retail and professional services.
If you suspect or believe you are impacted by Emotet, you need to very quickly:
While the focus is on containment, remediation and notification to potential recipients of emails, at the same time, an assessment of whether the incident is an Eligible Data Breach under the Privacy Act 1988 (Cth). Statutory investigation and notification timeframes apply, so this needs to be done expeditiously.
If you have cyber insurance, contact your insurer to obtain assistance from expert vendors to assist your response capabilities.
We commend the ACSC and DPC VIC for leading the national and regional response to this incident and providing real time updates on the impact to government and the private sector.
More information is available here:
Additional resources from well-known security providers such as Crowdstrike, Carbon Black, Sophos, Symantec are available online.
Clyde & Co has the largest dedicated and rapidly expanding cyber incident response practice in Australia and New Zealand. Our experienced team have dealt with over 700 data breach and technology related disputes in recent times, including a number of the largest and most complex incidents in Asia Pacific to date.
From pre-incident readiness, breach response, through to defence of regulatory investigations and proceedings, as well as recovery actions against wrongdoers, we assist clients in Asia Pacific across the full cyber lifecycle. Our team is also highly regarded for their expertise and experience in managing all forms of disputes across sectors including advising on some of the most newsworthy class actions commenced in Australia.
Our 24 hour cyber incident response hotline or email allows you to access our team directly around the clock. For more information, contact us on: