O famoso Infostealer “Agente Tesla” tem uma conta-gotas incomum

Cisco Talos discutida uma campanha maliciosa destinada a roubar as credenciais do usuário e outras informações importantes. Eles relataram que o Infostealer Agent Tesla tinha uma conta-gotas incomum.

Tele malwares, ataques cujos começou em janeiro, utiliza o carregador de arranque original para protecção de bypass anti-vírus e injectar o seu código para um processo legítimo em uma máquina infectada. A carga útil é o Agente Tesla, a well-known infostealer that can steal credentials from browsers, email clients, and FTP applications.

“The adversaries use custom droppers, which inject the final malware into common processes on the victim machine. Once infected, the malware can steal information from many popular pieces of software, including the Google Chrome, Safari and Firefox web browsers”, - relatório Cisco Talos specialists.

The uniqueness of the identified campaign lies in the methods used by cybercriminals to bypass security systems. The malware is delivered to the target device using a spam email, to which an archive with the ARJ extension is attached. The use of a popular packer in the 90s is dictated by the desire to make it difficult to detect malicious contentcybercriminals hope that email verification systems will not be able to process the outdated format.

The malware archive contains one executable file, which is an obfuscated Autoit script. After starting, it checks the presence of a virtual machine using a short list of processes and, if it is absent, extracts it in parts and generates a payload.

“The malware performs all operations in the device’s memory without leaving any traces on the hard disk, which makes it even more difficult to detect”, – say Cisco Talos researchers.

The installer code contains several functions that are not used in current attacks. Por exemplo, a script is able to download additional files from the Internet, as well as to work with the command line.

LER  Pesquisadores da Cisco Talos encontrado vulnerabilidade no DBMS SQLite

At the final stage of the installation, the malware decodes the shell code, which is encrypted using the RC4 stream algorithm, and selects one of the legitimate processes for introducing the payload. This is the obfuscated version of the Agent Tesla malware that can extract information from browsers and other software.

Leia também: Os criminosos dão links para trojan RAT em WebEx convites

Infostealer is well known to information security specialists. Agent Tesla has been seen more than once during BEC campaigns. Ano passado, o Gold Galleon group used targeted mailings and social engineering methods to deliver malware to shipping companies’ computadores. Targeted attacks using data theft programs allowed attackers to steal about $4 milhão from transport operators with a low level of information security in six months.

[Total: 0    Média: 0/5]

Sobre Trojan Killer

Carry Trojan Killer portátil em seu memory stick. Certifique-se que você é capaz de ajudar o seu PC resistir a quaisquer ameaças cibernéticas onde quer que vá.

Além disso, verifique

instruções de remoção processo suspeito MSASCuiL.exe.

MSASCuiL.exe é um processo que pode ser convenientemente rastreado no Gerenciador de Tarefas como ativa. …

Remover Wudfhosts.exe Miner: Passos fácil de desinstalar

Um novo, muito vírus mineiro criptomoeda prejudicial realmente foi detectado pela proteção e segurança …

Deixar uma resposta