{"id":16204,"date":"2021-06-24T14:39:44","date_gmt":"2021-06-24T13:39:44","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=16204"},"modified":"2021-09-14T11:50:46","modified_gmt":"2021-09-14T10:50:46","slug":"newsletter-cert-w-june-2021","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/","title":{"rendered":"Newsletter CERT-W, from the front line &#8211; June 2021"},"content":{"rendered":"<figure id=\"post-16207 media-16207\" class=\"align-center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16207\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png\" alt=\"\" width=\"1621\" height=\"455\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png 1621w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH-437x123.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH-71x20.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH-768x216.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH-1536x431.png 1536w\" sizes=\"auto, (max-width: 1621px) 100vw, 1621px\" \/><\/figure>\n<h1 style=\"text-align: center;\"><strong>DECRYPTION<\/strong><\/h1>\n<h2 style=\"text-align: center;\">CYBER CRIMINAL NETWORK DISMANTELING<\/h2>\n<p><strong>The last 6 months, large-scale coordinated international actions have dismantled several of the biggest cybercriminal networks such as Emotet, Netwalker, Egregor or even Cl0p. Let\u2019s have a closer look at some of them.<\/strong><\/p>\n<p><strong>What is&nbsp;Emotet?<\/strong><\/p>\n<p>Emotet&nbsp;was originally a&nbsp;<strong>banking trojan,<\/strong> stealing emails and contact list, retrieving&nbsp;passwords on navigators and systems, spreading within the infected network.&nbsp;In&nbsp;2019,&nbsp;Emotet&nbsp;lost its banking module and became a&nbsp;<strong>dropper<\/strong> of malwares. The trojan used&nbsp;a&nbsp;<a href=\"https:\/\/www.justice.gov\/opa\/pr\/emotet-botnet-disrupted-international-cyber-operation\"><strong>botnet of 1.6 million machines<\/strong><\/a>&nbsp; to realize phishing campaign and install itself on victims\u2019 machines.<\/p>\n<p><strong>Why is&nbsp;Emotet called the \u201cking of malware\u201d?<\/strong><\/p>\n<p>At the end of 2020,&nbsp;Emotet&nbsp;was identified as&nbsp;<a href=\"https:\/\/www.europol.europa.eu\/newsroom\/news\/world%E2%80%99s-most-dangerous-malware-emotet-disrupted-through-global-action\"><strong>one of the most dangerous&nbsp;malwares<\/strong><\/a>. Additionally, being a dropper as well as a botnet,&nbsp;Emotet&nbsp;also&nbsp;served&nbsp;as a&nbsp;<strong>front&nbsp;door<\/strong>&nbsp;to many other malwares.&nbsp;It&nbsp;was used to drop malicious payloads directly onto the victims\u2019 assets: for example,&nbsp;TrickBot&nbsp;was dropped onto the targeted machine which in turn, would drop&nbsp;<strong>Ryuk&nbsp;or Conti ransomware<\/strong>. According to Checkpoint Research,&nbsp;Emotet&nbsp;was at the top of the Global Threat Index in October 2020 and was linked to a&nbsp;<a href=\"https:\/\/blog.checkpoint.com\/2021\/01\/07\/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat\/\"><strong>wave of ransomware attacks<\/strong><\/a>.&nbsp;According to CISA, the U.S. Cybersecurity &amp; Infrastructure Security Agency,&nbsp;Emotet&nbsp;infections cost is estimated at&nbsp;<a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/emotet\"><strong>$1 million per incident<\/strong><\/a><strong>.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-16210 media-16210\" class=\"align-center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16210\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/emotet.png\" alt=\"\" width=\"877\" height=\"720\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/emotet.png 877w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/emotet-233x191.png 233w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/emotet-48x39.png 48w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/emotet-768x631.png 768w\" sizes=\"auto, (max-width: 877px) 100vw, 877px\" \/><\/figure>\n<p style=\"text-align: center;\"><em>Main TA542\u2019s customer base, \u201cThe Malware As a Service EMOTET\u201d, ANSSI 2021<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>During several months, Europol used the help of Eurojust, France, Germany, United States of America and announced their successful dismantle of the Emotet network in January 2021.<\/p>\n<p><strong>Does this dismantling&nbsp;mean&nbsp;the end of the&nbsp;malware?<\/strong><\/p>\n<p>The end of one botnet actually <a href=\"https:\/\/info.phishlabs.com\/blog\/emotet-dismantled-trickbot-zloader-and-bazarloader-step-in\"><strong>led to&nbsp;the rise of several others<\/strong><\/a>, such as&nbsp;TrickBot, which even though existed since 2016, replaced Emotet as one of the most well-established&nbsp;MaaS&nbsp;(Malware as a Service) not long after the events on January.<\/p>\n<p>This turn of events might not be so surprising, as threat actors often pivot and change their tools along the way, whether by choice or by necessity as it was the case here. Taking one malware down would only force them to use another one. Yet, what is interesting is that&nbsp;<a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2020\/10\/12\/trickbot-ransomware-cyberthreat-us-elections\/\"><strong>TrickBot&nbsp;also suffered a dismantlement of its own<\/strong><\/a>, back in October 2020. In an attempt to disrupt one of the most used distributors of ransomware, Microsoft joined forces with other security teams to take down&nbsp;TrickBot&nbsp;servers. As you may have noticed, this was months before law-enforcement took down&nbsp;Emotet, and now&nbsp;<a href=\"https:\/\/securityintelligence.com\/posts\/trickbot-survival-instinct-trickboot-version\/\"><strong>TrickBot&nbsp;or other versions of this malware, still lives on<\/strong><\/a>. These actions only disrupted&nbsp;TrickBot&nbsp;activities for a few days, before going back to what&nbsp;it was and even&nbsp;<strong>overtaking&nbsp;Emotet&nbsp;dominance<\/strong>.<\/p>\n<p>Moreover, TrickBot&nbsp;seems to be somehow connected to the&nbsp;<strong><a href=\"https:\/\/www.cybereason.com\/threat-alert-new-trickbot-variants\">Bazar<\/a><\/strong>&nbsp;malware (BazarLoader&nbsp;and&nbsp;BazarBackdoor), as some part of its infrastructure is shared with&nbsp;TrickBot&nbsp;and both show code similarities. This new toolset is now the most seen malware used to deploy&nbsp;Ryuk&nbsp;ransomware instead of the previous&nbsp;Emotet-TrickBot-Ryuk&nbsp;or&nbsp;TrickBot-Ryuk&nbsp;chain of infection. These changes might have to do with the previously mentioned&nbsp;dismantlements, or due to a new collaboration between threat actors.<\/p>\n<p><strong>What about the people behind these groups?<\/strong><\/p>\n<p>More recently, on June 4th,&nbsp;<a href=\"https:\/\/www.justice.gov\/opa\/pr\/latvian-national-charged-alleged-role-transnational-cybercrime-organization\"><strong>Alla&nbsp;Witte was charged on multiple counts<\/strong><\/a> for participating in&nbsp;TrickBot&nbsp;criminal activities. Is this arrest, serving as a warning with several hundreds of years of prison if convicted, going to change cybercriminals\u2019 operations? A few months before that, the Ukrainian authorities cooperated with the French law enforcement to conduct&nbsp;<a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2021\/02\/egregor-ransomware-hit-by-arrests\/\"><strong>an arrest against Egregor members<\/strong><\/a>, while&nbsp;<a href=\"https:\/\/threatpost.com\/netwalker-ransomware-suspect-charged\/163405\/\"><strong>a Canadian tied to&nbsp;Netwalker&nbsp;ransomware was charged<\/strong>&nbsp;<\/a>by the police for distributing the malware. Last year was also marked by several other arrests of cybercriminals around the world. For instance,&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/europol-arrests-hackers-behind-infinity-black-hacker-group\/\"><strong>the arrest of members of the Infinity Black website&nbsp;<\/strong><\/a>selling user credentials, lead to the end of the website and the group altogether. On the other hand, the arrests mentioned regarding&nbsp;Netwalker&nbsp;and Egregor seem to concern ransomware affiliates. And as the operators are still free and collaborate with other affiliates, their ransomware continues being deployed around the world.&nbsp;Alla&nbsp;Witte\u2019s case is different since she is suspected to be a malware developer for the&nbsp;TrickBot&nbsp;Group. While her possible conviction might slightly disrupt&nbsp;TrickBot, it seems like their operations still go on, as according to <a href=\"https:\/\/any.run\/malware-trends\/trickbot\">the&nbsp;any.run&nbsp;website and its malware trend tracker, the trojan was last seen on June 16th, 2021<\/a>. Last but not least, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ukraine-arrests-clop-ransomware-gang-members-seizes-servers\/\">some mid-tier members of the Cl0p gang may have been arrested<\/a> mid-June in Ukraine even though it seems no core actor behind Cl0p were apprehended.<\/p>\n<p><strong>What could be the long-term consequences of these takedown for the cybercriminal activities?<\/strong><\/p>\n<p>It\u2019s still early to draw meaningful conclusions on the consequences for cybercriminal activities with the recent arrests. Yesterday, June 16th, at the Geneva summit, U.S. <a href=\"https:\/\/www.zdnet.com\/article\/biden-and-putin-spar-over-cybersecurity-ransomware-at-geneva-summit\/\"><strong>President Joe Biden met with Russian President Vladimir Putin<\/strong><\/a>. One of the hot topics of discussions was the <strong>ransomware attacks on U.S. entities from Russian soil<\/strong>. Biden warned Putin that United States would not tolerate any other cyber-attacks, especially on 16 critical sectors. The <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-russia-told-to-tackle-cyber-criminals-operating-from-within-its-borders\/\"><strong>G7<\/strong><\/a> and the <a href=\"https:\/\/www.zdnet.com\/article\/nato-series-of-cyberattacks-could-be-seen-as-the-same-threat-as-an-armed-attack\/\"><strong>NATO<\/strong><\/a> also stated that in order not to consider cyber-attacks as armed attacks, Russia should try to identify and disrupt ransomware organizations within its borders.<\/p>\n<p>Even with the arrests of criminal gang members and cybersecurity talks at the presidential levels, <strong>some experts say there would be no or little impact on ransomware groups that will still operate with impunity<\/strong>. The near future will give hints about the possible evolution of the cyber-attacks landscape. On one hand, the rising of a broader international collaboration against cyber-criminal gangs which could lead to less opportunistic and lucrative attacks. On the other hand, growing tensions between two blocks: U.S.-Europe and Russia-China with possible sanctions from either side and more cyber espionage, supply-chain or state-sponsored attacks.<\/p>\n<p>&nbsp;<\/p>\n<h1 style=\"text-align: center;\"><strong>CERT-W: FROM THE FRONT LINE<\/strong><\/h1>\n<h2 style=\"text-align: center;\">The First Responder Word<\/h2>\n<figure id=\"post-16221 media-16221\" class=\"align-center\">\n<figure id=\"post-16228 media-16228\" class=\"align-center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16228\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/ng.jpg\" alt=\"\" width=\"936\" height=\"638\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/ng.jpg 936w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/ng-280x191.jpg 280w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/ng-57x39.jpg 57w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/ng-768x523.jpg 768w\" sizes=\"auto, (max-width: 936px) 100vw, 936px\" \/><\/figure>\n<\/figure>\n<h1><\/h1>\n<p>&nbsp;<\/p>\n<h1 style=\"text-align: center;\"><strong>FOCUS TECH<\/strong><\/h1>\n<h2 style=\"text-align: center;\">Phishing<\/h2>\n<p>Think like a cybercriminal and understand how a spear phishing campaign is built to avoid them!<\/p>\n<p>The technical zoom of the month:<\/p>\n<figure id=\"post-16215 media-16215\" class=\"align-center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16215\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/image.png\" alt=\"\" width=\"973\" height=\"1849\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/image.png 973w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/image-101x191.png 101w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/image-21x39.png 21w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/image-768x1459.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/image-808x1536.png 808w\" sizes=\"auto, (max-width: 973px) 100vw, 973px\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong>To learn more about this:<\/strong><\/p>\n<figure id=\"post-16217 media-16217\" class=\"align-center\"><a href=\"https:\/\/www.proofpoint.com\/us\/resources\/threat-reports\/state-of-phish-infographic\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-16217\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/learn.png\" alt=\"\" width=\"235\" height=\"197\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/learn.png 462w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/learn-227x191.png 227w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/learn-46x39.png 46w\" sizes=\"auto, (max-width: 235px) 100vw, 235px\" \/><\/a><\/figure>\n<p>&nbsp;<\/p>\n<h1 style=\"text-align: center;\"><strong>Reading Of The Month<\/strong><\/h1>\n<p style=\"text-align: center;\">We recommend the short report \u201cAPT trends report Q1 2021\u201d, which reviews the highlight events and findings observed by the Global Research and Analysis Team at Kaspersky during the Q1 2021 around the world.<\/p>\n<figure id=\"post-16219 media-16219\" class=\"align-center\"><a href=\"https:\/\/securelist.com\/apt-trends-report-q1-2021\/101967\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-16219\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/read.jpg\" alt=\"\" width=\"248\" height=\"154\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/read.jpg 415w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/read-308x191.jpg 308w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/read-63x39.jpg 63w\" sizes=\"auto, (max-width: 248px) 100vw, 248px\" \/><\/a><\/figure>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DECRYPTION CYBER CRIMINAL NETWORK DISMANTELING The last 6 months, large-scale coordinated international actions have dismantled several of the biggest cybercriminal networks such as Emotet, Netwalker, Egregor or even Cl0p. Let\u2019s have a closer look at some of them. What is&nbsp;Emotet?&#8230;<\/p>\n","protected":false},"author":1364,"featured_media":14576,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3973,3273],"tags":[3923,3487,2772,3925,3934,3479,3438,2944,3926,3924],"coauthors":[3488],"class_list":["post-16204","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cert-newsletter","category-ethical-hacking-indicent-response-en","tag-cdt","tag-cert-w-en","tag-cybersecurity","tag-emotet","tag-front-line","tag-indicators","tag-malware-en","tag-newsletter","tag-phishing-en","tag-watch"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Newsletter CERT-W, from the front line - June 2021 - RiskInsight<\/title>\n<meta name=\"description\" content=\"Newsletter CERT-W June 2021 has been published to help you find the latest news on cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Newsletter CERT-W, from the front line - June 2021 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Newsletter CERT-W June 2021 has been published to help you find the latest news on cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-24T13:39:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-14T10:50:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1641\" \/>\n\t<meta property=\"og:image:height\" content=\"1158\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CERT-W\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CERT-W\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/\"},\"author\":{\"name\":\"CERT-W\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca\"},\"headline\":\"Newsletter CERT-W, from the front line &#8211; June 2021\",\"datePublished\":\"2021-06-24T13:39:44+00:00\",\"dateModified\":\"2021-09-14T10:50:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/\"},\"wordCount\":1141,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"keywords\":[\"CDT\",\"CERT-W\",\"cybersecurity\",\"emotet\",\"front line\",\"indicators\",\"malware\",\"Newsletter\",\"phishing\",\"watch\"],\"articleSection\":[\"CERT Newsletter\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/\",\"name\":\"Newsletter CERT-W, from the front line - June 2021 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"datePublished\":\"2021-06-24T13:39:44+00:00\",\"dateModified\":\"2021-09-14T10:50:46+00:00\",\"description\":\"Newsletter CERT-W June 2021 has been published to help you find the latest news on cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"width\":1641,\"height\":1158},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Newsletter CERT-W, from the front line &#8211; June 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca\",\"name\":\"CERT-W\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/cert-w\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Newsletter CERT-W, from the front line - June 2021 - RiskInsight","description":"Newsletter CERT-W June 2021 has been published to help you find the latest news on cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/","og_locale":"en_US","og_type":"article","og_title":"Newsletter CERT-W, from the front line - June 2021 - RiskInsight","og_description":"Newsletter CERT-W June 2021 has been published to help you find the latest news on cybersecurity.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/","og_site_name":"RiskInsight","article_published_time":"2021-06-24T13:39:44+00:00","article_modified_time":"2021-09-14T10:50:46+00:00","og_image":[{"width":1641,"height":1158,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"CERT-W","twitter_misc":{"Written by":"CERT-W","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/"},"author":{"name":"CERT-W","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca"},"headline":"Newsletter CERT-W, from the front line &#8211; June 2021","datePublished":"2021-06-24T13:39:44+00:00","dateModified":"2021-09-14T10:50:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/"},"wordCount":1141,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg","keywords":["CDT","CERT-W","cybersecurity","emotet","front line","indicators","malware","Newsletter","phishing","watch"],"articleSection":["CERT Newsletter","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/","name":"Newsletter CERT-W, from the front line - June 2021 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg","datePublished":"2021-06-24T13:39:44+00:00","dateModified":"2021-09-14T10:50:46+00:00","description":"Newsletter CERT-W June 2021 has been published to help you find the latest news on cybersecurity.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg","width":1641,"height":1158},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/06\/newsletter-cert-w-june-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Newsletter CERT-W, from the front line &#8211; June 2021"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca","name":"CERT-W","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/cert-w\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/16204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=16204"}],"version-history":[{"count":12,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/16204\/revisions"}],"predecessor-version":[{"id":16786,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/16204\/revisions\/16786"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/14576"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=16204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=16204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=16204"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=16204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}