Security researchers examine how and when Emotet’s operators may resurface, and the threats that could evolve in the meantime.