Emotet Uses Compromised Devices as Proxy Command Servers

Click here to visit Original posting

A new Emotet Trojan variant has been observed in the wild with the added capabilities of using compromised connected devices as proxy command-and-control servers and of employing random URI directory paths to evade network-based detection rules. [...]