• Categories
    Category
  • Categories
    Category
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
News Comments FAQ Related Articles

Uniden commercial site compromised to distribute Emotet trojan

5437

The official website of Uniden has been compromised to host an MS Word document that delivers a variant of the Emotet trojan known as Geodo and Heodo.

The malicious Word document is capable of delivering three JavaScript payloads and all three payloads have signatures for Geodo.

Uniden's official website was compromised to host an MS Word document which delivers a variant of Emotet trojan called Geodo and Heodo. This was brought to light by URLhaus project, which shared malicious URLs that are being used for malware distribution.

URLhaus stated that the malicious Word document is stored in the ‘/wp-admin/legale/’ folder and includes a macro that downloads the Emotet variant ‘Geodo’. It could possibly deliver three JavaScript payloads and all three payloads have signatures for Geodo.

All three of payloads are currently detected by 26 antivirus engines on VirusTotal. 20 antivirus engines on VirusTotal acknowledges the Word document with a malicious macro as a threat.

Although Uniden was alerted about the said compromise through a twitter post, the website is still compromised.

Tags:
owen
Author: 

Comments ( 0 )

No comments available

Add a comment

Frequently asked questions ( 0 )

No questions available

Related News in Uniden commercial site compromised to distribute Emotet trojan

Related News in Uniden commercial site compromised to distribute Emotet trojan

New strain of Emotet banking Trojan spreading internally like Worm
New strain of Emotet banking Trojan spreading internally like Worm
Jul 24, 2017
Security Researchers Discovered that the fake emails distribute Remcos RAT Variant
Security Researchers Discovered that the fake emails distribute Remcos RAT Variant
Oct 28, 2019
Anubis Android trojan spotted stealing PayPal credentials and locking devices
Anubis Android trojan spotted stealing PayPal credentials and locking devices
Apr 11, 2019
Android App With 100M Downloads affected by Trojan Dropper Malware
Android App With 100M Downloads affected by Trojan Dropper Malware
Sep 6, 2019
Android Users from Australia Targeted By Trojan
Android Users from Australia Targeted By Trojan
Apr 15, 2019
Trickbot Trojan Goes past Proofpoint Gateway Using Google Docs
Trickbot Trojan Goes past Proofpoint Gateway Using Google Docs
Sep 6, 2019
Newly discovered BasBanke banking trojan found targeting Brazilian users
Newly discovered BasBanke banking trojan found targeting Brazilian users
Apr 10, 2019
Clicker Trojan Infected iOS Apps Are Taken Down By Apple
Clicker Trojan Infected iOS Apps Are Taken Down By Apple
Oct 30, 2019
Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Jayce ?
What are the types of table used in IPtables

What are the various types of table used in IPtables and how to use that for my server security?

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.