A waring to everyone since this attack has begun in April 2018 and for two years is not surprising if you are also affected.
Emotet, the notorious trojan behind a number of botnet-driven spam campaigns and ransomware attacks, has found a new attack vector: using already infected devices to identify new victims that are connected to nearby Wi-Fi networks.
According to researchers at Binary Defense, the newly discovered Emotet sample levera
ges a "Wi-Fi spreader" module to scan Wi-Fi networks, and then attempts to infect devices that are connected to them.
The cybersecurity firm said the Wi-Fi spreader has a timestamp of April 16, 2018, indicating the spreading behavior has been running "unnoticed" for close to two years until it was detected for the first time last month.
Based on what I read in the below quiote, the most affected are the Windows users as the bot is installed as Windows Defender System Service. I presume tha those with other operating systems have to chainge at least their WI-Fi passwords.
After having successfully brute-forced users and their passwords, the worm moves to the next phase by installing malicious payloads — called "service.exe" — on the newly infected remote systems. To cloak its behavior, the payload is installed as a Windows Defender System Service (WinDefService).
The priciple of work of Emotet >
The source >
https://thehackernews.com/2020/02/emotet-malware-wifi-hacking.html