[Osaka/Yokohama/Tokushima] Looking for infrastructure/server side engineers!

[Osaka/Yokohama/Tokushima] Looking for infrastructure/server side engineers!

[Deployed by over 500 companies] AWS construction, operation, maintenance, and monitoring services

[Deployed by over 500 companies] AWS construction, operation, maintenance, and monitoring services

[Successor to CentOS] AlmaLinux OS server construction/migration service

[Successor to CentOS] AlmaLinux OS server construction/migration service

[For WordPress only] Cloud server “Web Speed”

[For WordPress only] Cloud server “Web Speed”

[Cheap] Website security automatic diagnosis “Quick Scanner”

[Cheap] Website security automatic diagnosis “Quick Scanner”

[Reservation system development] EDISONE customization development service

[Reservation system development] EDISONE customization development service

[Registration of 100 URLs is 0 yen] Website monitoring service “Appmill”

[Registration of 100 URLs is 0 yen] Website monitoring service “Appmill”

[Compatible with over 200 countries] Global eSIM “Beyond SIM”

[Compatible with over 200 countries] Global eSIM “Beyond SIM”

[If you are traveling, business trip, or stationed in China] Chinese SIM service “Choco SIM”

[If you are traveling, business trip, or stationed in China] Chinese SIM service “Choco SIM”

[Global exclusive service] Beyond's MSP in North America and China

[Global exclusive service] Beyond's MSP in North America and China

[YouTube] Beyond official channel “Biyomaru Channel”

[YouTube] Beyond official channel “Biyomaru Channel”

[Security] Try using the Emotet infection confirmation tool "EmoCheck" [Tool]

This is Ohara from the technical sales department.

This time, I used the security check tool "EmoCheck" to check whether my PC terminal was infected with "Emotet".
(Information as of May 2022)

In addition, the following articles were used as reference in creating this article.
https://www.keishicho.metro.tokyo.lg.jp/kurashi/cyber/joho/emotet.html
https://blogs.jpcert.or.jp/ja/2019/12/emotetfaq.html

About Emotet

Emotet is a highly contagious malware whose main infection route is through malicious email attachments sent by malicious attackers.

In the unlikely event that Emotet is infected, the attacker will collect the account information, passwords, address books, email history, etc. of the users of the infected PC terminal. Attackers who have collected this information can generate ``spoofed emails'' and spread them to other email recipients, causing various damage.

How to download, operate, and check “EmoCheck”

https://github.com/JPCERTCC/EmoCheck/releases in the address bar of your web browser to be redirected to the "github" page.

② Download the exe file suitable for the environment and version of your PC terminal from the github page.

③ After downloading and installing the exe file, a screen like the one below will immediately appear. If there are no problems, "Emotet was not detected." will be displayed.

*If sentences such as "Emotet process was found" or "Emotet was detected" are displayed on the screen in step 3 above, click [ https://blogs.jpcert.or.jp/ja/ 2019/12/emotetfaq.html ] You need to follow the steps in "2-1-3. What to do in case of infection".

summary

The above is how to operate and check "EmoCheck".

We also recommend that you do not click on emails, files, or links that you do not recognize or trust, and that you install anti-malware/removal software on your PC to strengthen security.

If you found this article helpful , please give it a like!
10
Loading...
10 votes, average: 1.00 / 110
4,698
X facebook Hatena Bookmark pocket
[2025.6.30 Amazon Linux 2 support ended] Amazon Linux server migration solution

[2025.6.30 Amazon Linux 2 support ended] Amazon Linux server migration solution

The person who wrote this article

About the author

ohara

I started my career in the telecommunications industry as a salesperson in charge of introducing IT products such as NW services, OA equipment, and groupware for corporations.

After that, he worked as a pre-sales engineer for physical servers/hosting services and as a customer engineer for SaaS-type SFA/CRM/BtoB e-commerce at an SIer-based data center business company, before joining his current company, Beyond.

Currently, I am stationed in Shenzhen, China, the Silicon Valley of Asia, and my daily routine is to watch Chinese dramas and billbill.

Qualification: Second class bookkeeping