A new phishing campaign has been captured by Fortinet that spreads a new Agent Tesla variant using a specially crafted Microsoft Excel document.
This follows the discovery of another phishing attack that uses ISO image file lures to launch malware strains such as Agent Tesla, LimeRAT, and Remcos RAT on infected hosts.
The Agent Tesla core module collects sensitive information from the victim’s device, security researcher Xiaopeng Zhang said.
Find out how well-equipped your organization truly is against identity threats Supercharge Your SkillsThe AgentTesla core module.
Analyzes CVE-2017-11882, CVE-2018-0802, and CVE-2019-0188.188[.
Meanwhile, in the realm of threat intelligence, Trend Micro reports that APT34, an Iranian threat actor tracked as Talos34, has been found to be involved in additional espionage activities.
His malicious payload is a variant of SideTwist that establishes communication with a remote server (11.0
๐ Feeling the vibes?
Keep the good energy going by checking out my Amazon affiliate link for some cool finds! ๐๏ธ
If not, consider contributing to my caffeine supply at Buy Me a Coffee โ๏ธ.
Your clicks = cosmic support for more awesome content! ๐๐
Leave a Reply