Analyzing an Agent Tesla campaign: from a word document to the attacker credentials

Introduction Information stealer malware are used on a daily basis by cyber-criminals. They are often designed to extract saved password stored within browsers, instant messaging applications, FTP clients and many more. Key-logger mechanism may also be embedded, in order to grab additional credentials, that are...

The post Analyzing an Agent Tesla campaign: from a word document to the attacker credentials appeared first on This is Security :: by Stormshield.

Article Link: https://thisissecurity.stormshield.com/2018/01/12/agent-tesla-campaign/