Emotet banking malware spread through one of the McAfee services

Emotet malware was hosted on a third-party website but was shared via a domain associated with McAfee ClickProtect. The malicious link was found by the researcher under the pseudonym Benkow. This link redirected users to the malicious Word document, after downloading and opening of which on the victim system Emotet was loaded. After it installs, the malware collected confidential data to hack into accounts and sent them to its command and control server.