Emotet Survival Handbook

Stop active infections and block new attacks.

The United States Computer Emergency Readiness Team (US-CERT) has recently described Emotet as "among the most costly and destructive malware" affecting organizations today. Once infections take hold they are designed to spread and gain persistence, sometimes launching hundreds of executables in the course of a day. Remediation efforts have cost infected organizations up to $1 million per incident.

Due to a recent surge of Emotet activity and requests for assistance, we're providing more information on how Emotet works along with tips on how to stop persistent infections and prevent outbreaks in the first place.

What's inside:

  • Tips for preventing compromise in the first place by defending against the most common Emotet attack vectors
  • Step-by-step instructions for identifying and isolating Emotet infections to stop outbreaks from launching repeatedly
  • Recommendations for avoiding malicious fallout from Emotet infections, including account lockouts, email hijacking, and credential theft
Download the Handbook