{"id":2665,"date":"2021-02-09T10:51:44","date_gmt":"2021-02-09T10:51:44","guid":{"rendered":"https:\/\/amtivo.com\/uk\/standards\/uncategorized\/untagged\/emotet-has-been-taken-down-what-does-this-mean-for-business-cybersecurity\/"},"modified":"2025-12-15T16:18:19","modified_gmt":"2025-12-15T16:18:19","slug":"emotet-has-been-taken-down-what-does-this-mean-for-business-cybersecurity","status":"publish","type":"standard-post-filter","link":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/emotet-has-been-taken-down-what-does-this-mean-for-business-cybersecurity\/","title":{"rendered":"Emotet Taken Down \u2013 Business Cyber Security and the Future"},"content":{"rendered":"<p><strong>January 2021 &#8211; in one of the biggest operations of recent times, police in eight countries seized 700 command and control (C2) servers used by a botnet called Emotet, cutting it off from the reported 1.6 million computers it has infected since last April. <\/strong><\/p>\r\n<p>Nicknamed Operation Ladybird, the police forces involved \u2013 <a href=\"https:\/\/www.europol.europa.eu\/newsroom\/news\/world%E2%80%99s-most-dangerous-malware-emotet-disrupted-through-global-action\" target=\"_blank\" rel=\"noopener\">Europol<\/a>, the <a href=\"https:\/\/www.justice.gov\/usao-mdnc\/pr\/emotet-botnet-disrupted-international-cyber-operation\" target=\"_blank\" rel=\"noopener\">FBI<\/a>, and Britain\u2019s National Crime Agency \u2013 were understandably delighted with their work. Within hours, one of cybercrime\u2019s most intractable malware delivery systems had been severely dented and perhaps put out of operation forever.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>Are We Now a Lot Safer?<\/h2>\r\n<p>Rather like drug seizures in conventional policing, high-profile botnet takedowns are an example of a news story which makes the public feel as if a blow has been struck. In both cases, the public isn\u2019t entirely wrong \u2013 disrupting a botnet\u2019s infrastructure is always a good thing because it halts the flow of damaging malware they distribute. The important caveat is what happens next.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>The Evolution of Botnets<\/h2>\r\n<p>First detected in 2014, Emotet was one of a new generation of online banking Trojans distributed using malicious email attachments and links. The key to its success was the way it was developed like a conventional software product, rapidly distributing successive versions targeting numerous banks while adding sophisticated features that blunted detection. Eventually, Emotet started operating like a botnet \u2013 a network of infected machines \u2013 as a way of distributing not only banking Trojans, but <em>any <\/em>payload. This was recently taken to its logical conclusion and Emotet morphed into something resembling a software platform offering this multipurpose capability as crime-as-a-service where its makers earn commission for every successful infection.<\/p>\r\n<p>Emotet\u2019s speciality was infected attachments, especially Word documents. This is a good choice because it\u2019s nearly impossible to block because doing so would halt most invoicing, discussion papers, policy documents, and shipping notices. Cleverly, the emails would come as replies to established email threads from known contacts, which also made it easier to persuade targets to enable macros, triggering the malware. Door opened, Emotet would gather profile data about its victim, helping the criminals decide what specific malware payload to deliver, often ransomware.<\/p>\r\n<p>Despite going quiet for periods, police say it\u2019s generated millions of dollars for its creators. \u00a0Botnets are traditionally measured by counting the number of computers they infect and control at any one time, but this can be misleading. A better yardstick is the damage done, and on that score Emotet is among the worst crimeware systems in the world, prominent in numerous malware attacks on companies, universities, schools, and even whole city administrations.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>Botnets Have Been Taken Down Before<\/h2>\r\n<p>Ever since they emerged around 20 years ago to distribute spam, botnets have been public enemy number one for police forces, and it\u2019s not hard to see why. As well as being important infrastructure for online crime, they make inviting targets for intervention. Usually, the only chance to stop malware is when it appears at the endpoint, but this has proved unreliable to say the least. A better alternative is to track and disrupt the botnet systems used to distribute malware in the first place.<\/p>\r\n<p>An early tactic was to contact the owners of computers that were part of botnets, the approach taken by the <a href=\"https:\/\/www.govtech.com\/security\/Bot-Roast-II-Reveals-More-Than.html\" target=\"_blank\" rel=\"noopener\">FBI\u2019s Operation Bot Roast<\/a> in 2007, which identified one million victims by their IP addresses. This was ineffective because the botnet controllers could infect new computers faster than the old ones could be cleaned. What it did establish, however, was the basis for anti-botnet cooperation between police forces and tech companies across jurisdictions. That allowed police to move on to more ambitious operations such as 2011\u2019s <a href=\"https:\/\/www.fbi.gov\/news\/stories\/international-cyber-ring-that-infected-millions-of-computers-dismantled\" target=\"_blank\" rel=\"noopener\">Operation Ghost Click<\/a>, which took over the infrastructure of the <a href=\"https:\/\/www.networkworld.com\/article\/2183957\/feds-lead-biggest-botnet-takedown-ever--end-massive-clickjack-fraud.html\" target=\"_blank\" rel=\"noopener\">DNSChanger<\/a> advertising botnet. Designed to route infected computer\u2019s traffic through rogue DNS servers (the servers which resolve Internet domains in web browsers), this had to be shut down carefully over a period of months so that surprised victims weren\u2019t simply cut off.<\/p>\r\n<p>Operation Ghost Click was described as the \u201cbiggest cybercriminal takedown in history.\u201d This seemed fair at the time \u2013 unusually several individuals were arrested and prosecuted for setting it up \u2013 but the triumphalism was premature; botnets continued to thrive and grow. More anti-botnet operations have followed, for example <a href=\"https:\/\/arstechnica.com\/information-technology\/2013\/12\/microsoft-disrupts-botnet-that-generated-2-7m-per-month-for-operators\/\" target=\"_blank\" rel=\"noopener\">against ZeroAccess<\/a> in 2013, <a href=\"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home\/librarydocuments\/viewdocument?DocumentKey=5a0ee571-2b14-4e02-8ff7-2c32e9227669&amp;CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&amp;tab=librarydocuments\" target=\"_blank\" rel=\"noopener\">Gameover Zeus<\/a> a year later, and the more recent takedowns <a href=\"https:\/\/www.nytimes.com\/2020\/03\/10\/us\/politics\/microsoft-botnets-malware.html\" target=\"_blank\" rel=\"noopener\">of Necurs<\/a> and <a href=\"https:\/\/www.nytimes.com\/2020\/10\/12\/us\/politics\/election-hacking-microsoft.html?searchResultPosition=1\" target=\"_blank\" rel=\"noopener\">Trickbot<\/a> in 2020.<\/p>\r\n<p>Recurring themes have included the involvement of Russian cybercriminals and a reliance on Microsoft\u2019s Digital Crimes Unit (DCU) for botnet intelligence and legal expertise. But the biggest theme of all is simply that none of these actions has ever delivered a knockout blow. A botnet was disrupted, leaving other cybercriminals to exploit the vacuum as a competitive advantage. It could be that botnet criminals evolved to dodge the takedowns with more resilient Command and Control systems or simply that there are too many botnets in the first place for any one takedown to make much of a difference.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>What Happens Next?<\/h2>\r\n<p>The action against Emotet might sound like a version of previous botnet busts, but there are intriguing differences. Not all the details have yet been released but it appears that the police and tech companies aren\u2019t simply seizing the botnet\u2019s servers and making a few arrests but instead they are using it to upload software updates that will remove the botnet from infected computers by 25th March. This is unusual but also complex for legal and technical reasons. The pay-off is that it should make it impossible for the botnet operators to contact the infected systems using a reconstituted Emotet 2.0, which means there\u2019s a reasonable chance Emotet is gone for good. If that interventionist model is a template for future anti-botnet operations, the Emotet takedown could be a botnet operation everyone remembers.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>How Can You Avoid Becoming a Victim of a Botnet?<\/h2>\r\n<p>Undoubtedly, organisations should be taking the risks from botnets very seriously, but there are measures you can take to significantly reduce the risks. These include:<\/p>\r\n<ul>\r\n\t<li>security policies that control what email users can do from their inboxes<\/li>\r\n\t<li><a href=\"https:\/\/securityintelligence.com\/how-basic-endpoint-patching-helps-protect-against-ransomware-and-other-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">endpoint patching<\/a><\/li>\r\n\t<li>ensuring you have a security team that knows how to look for the <a href=\"https:\/\/www.businessnewsdaily.com\/1368-6-signs-computer-infected.html\" target=\"_blank\" rel=\"noopener noreferrer\">symptoms of infection<\/a>.<\/li>\r\n<\/ul>\r\n<p>Obtaining certification such as Cyber Essentials, Cyber Essentials Plus or <a href=\"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/benefits-to-business\/\" rel=\"noopener\">ISO 27001<\/a> would help to provide confidence that your security measures are sufficient or highlight any areas of weakness before they become a problem.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>In Conclusion<\/h2>\r\n<p>Each botnet has its own indicators of compromise (IoCs), which in Emotet\u2019s case includes a known set of IP addresses for its Command and Control system. At some point, more detail will become available and it should make essential reading for security staff looking to plan their organisation&#8217;s response. It\u2019s not clear how the authorities will go about cleaning infections but we expect that SMEs involved will be contacted by local police forces.<\/p>\r\n<p>As in the past, other botnets will fill the gap left by Emotet, learning as much from its downfall as our authorities do. Therefore, whilst this operation was a good day for cybersecurity it will not be the last action in a war that\u2019s gone on longer than anyone expected two decades ago.<\/p>\r\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"With Emotet gone, businesses can relax &#8211; but staying vigilant against evolving cyber threats is still vital.","protected":false},"author":24,"featured_media":2172,"template":"","meta":{"_acf_changed":false,"_searchwp_excluded":"","footnotes":""},"standard-post-categories":[31],"standard-post-tags":[32],"class_list":["post-2665","standard-post-filter","type-standard-post-filter","status-publish","has-post-thumbnail","hentry","standard-post-categories-insights","standard-post-tags-cyber-essentials"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Emotet Taken Down \u2013 Business Cyber Security and the Future<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/emotet-has-been-taken-down-what-does-this-mean-for-business-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emotet Taken Down \u2013 Business Cyber Security and the Future\" \/>\n<meta property=\"og:description\" content=\"With Emotet gone, businesses can relax - but staying vigilant against evolving cyber threats is still vital.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/emotet-has-been-taken-down-what-does-this-mean-for-business-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Amtivo UK\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-15T16:18:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2021\/02\/Emotet-Takedown-Cybercrime-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1176\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Emotet Taken Down \u2013 Business Cyber Security and the Future","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/emotet-has-been-taken-down-what-does-this-mean-for-business-cybersecurity\/","og_locale":"en_GB","og_type":"article","og_title":"Emotet Taken Down \u2013 Business Cyber Security and the Future","og_description":"With Emotet gone, businesses can relax - but staying vigilant against evolving cyber threats is still vital.","og_url":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/emotet-has-been-taken-down-what-does-this-mean-for-business-cybersecurity\/","og_site_name":"Amtivo UK","article_modified_time":"2025-12-15T16:18:19+00:00","og_image":[{"width":2000,"height":1176,"url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2021\/02\/Emotet-Takedown-Cybercrime-1.png","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg","twitter_misc":{"Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/emotet-has-been-taken-down-what-does-this-mean-for-business-cybersecurity\/","url":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/emotet-has-been-taken-down-what-does-this-mean-for-business-cybersecurity\/","name":"Emotet Taken Down \u2013 Business Cyber Security and the Future","isPartOf":{"@id":"https:\/\/amtivo.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/emotet-has-been-taken-down-what-does-this-mean-for-business-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/emotet-has-been-taken-down-what-does-this-mean-for-business-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2021\/02\/Emotet-Takedown-Cybercrime-1.png","datePublished":"2021-02-09T10:51:44+00:00","dateModified":"2025-12-15T16:18:19+00:00","breadcrumb":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/emotet-has-been-taken-down-what-does-this-mean-for-business-cybersecurity\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/emotet-has-been-taken-down-what-does-this-mean-for-business-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/emotet-has-been-taken-down-what-does-this-mean-for-business-cybersecurity\/#primaryimage","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2021\/02\/Emotet-Takedown-Cybercrime-1.png","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2021\/02\/Emotet-Takedown-Cybercrime-1.png","width":2000,"height":1176,"caption":"Emotet Takedown Cybercrime"},{"@type":"BreadcrumbList","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/emotet-has-been-taken-down-what-does-this-mean-for-business-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amtivo.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Standards","item":"https:\/\/amtivo.com\/uk\/standards\/"},{"@type":"ListItem","position":3,"name":"Cyber Essentials","item":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/"},{"@type":"ListItem","position":4,"name":"Insights","item":"https:\/\/amtivo.com\/uk\/standards\/insights\/"},{"@type":"ListItem","position":5,"name":"Emotet Taken Down \u2013 Business Cyber Security and the Future"}]},{"@type":"WebSite","@id":"https:\/\/amtivo.com\/uk\/#website","url":"https:\/\/amtivo.com\/uk\/","name":"Amtivo","description":"","publisher":{"@id":"https:\/\/amtivo.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amtivo.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/amtivo.com\/uk\/#organization","name":"Amtivo","url":"https:\/\/amtivo.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","width":371,"height":203,"caption":"Amtivo"},"image":{"@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/2665","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter"}],"about":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/types\/standard-post-filter"}],"author":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/users\/24"}],"version-history":[{"count":6,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/2665\/revisions"}],"predecessor-version":[{"id":7132,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/2665\/revisions\/7132"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media\/2172"}],"wp:attachment":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media?parent=2665"}],"wp:term":[{"taxonomy":"standard-post-categories","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-categories?post=2665"},{"taxonomy":"standard-post-tags","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-tags?post=2665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}