A new variant of the Agent Tesla malware has emerged, employing a lure file using the ZPAQ compression format to extract data from numerous email clients and nearly 40 web browsers. G Data's malware analyst, Anna Lvova, highlighted in her analysis that ZPAQ, known for its exceptional compression ratio and journaling function compared to widely-used formats like ZIP and RAR, allows for smaller archives, conserving storage space and bandwidth during file transfers. However, ZPAQ faces a notable downside due to limited software support. Initially appearing in 2014, Agent Tesla functions as a keylogger and remote access trojan (RAT) coded in .NET. It is distributed through a malware-as-a-service (MaaS) model, acting as an initial payload to provide remote access to compromised systems and enabling the download of more advanced second-stage tools, such as ransomware. Recent campaigns exploit a memory corruption vulnerability in Microsoft Office's Equation Editor, dating back six years and typically initiated through phishing emails. The recent attack commences with an email containing a ZPAQ file attachment masquerading as a PDF document. Upon opening, this attachment reveals a hefty .NET executable file, predominantly filled with zero bytes to falsely inflate the sample size to 1 GB, effectively evading conventional security measures. The unpacked .NET executable is crafted to begin the download of a file with a .wav extension, subsequently decrypting it. Lvova clarified that the utilization of widely recognized file extensions aids in disguising the traffic as normal, making it more challenging for network security solutions to detect and thwart malicious activities. The primary aim of the attack is to infiltrate the endpoint with Agent Tesla, concealed using .NET Reactor, a legitimate code protection software. Command-and-control (C2) communications are established via Telegram. This development underscores the trend of threat actors experimenting with unconventional file formats for malware delivery, emphasizing the importance of users remaining vigilant against suspicious emails and keeping their systems up-to-date.
As per sources a major security flaw has been found in the Model Context Protocol (MCP), a standard introduced by Anthropic in 2024 to help generative AI tools like Claude 3.7 Sonn...
A new ransomware strain dubbed “Ghost” (also known as Cring) has escalated into a significant global threat. First identified in 2021, it has recently resurged with alarming in...
A serious security issue has been identified in SonicWall's SMA100 series appliances, prompting a critical alert from the Cybersecurity and Infrastructure Security Agency (CISA...