An uninstall process, pushed out to infected devices as part of the takedown of Emotet by law enforcement, has been triggered to kill the malware.
Police in the US and Europe have disrupted the Emotet botnet, taking over its servers and cutting off communications with infected computers.
The Emotet malware has begun spreading again after one of its periodic breaks, using Christmas and COVID lures.
The EmoCrash exploit took advantage of a flaw in the Emotet trojan's code to help defenders stop the malware for more than six months.
A recent Emotet malware campaign is homing in on victims in the military and government sectors.