Home Agent Tesla Evolved to Avoid Detection by Utilising Telegram and Tor!

Agent Tesla Evolved to Avoid Detection by Utilising Telegram and Tor!

There have been recent changes to the Agent Tesla family of Remote Access Trojan Malware (RAT). Many cybercriminals have used this malware in order to steal user credentials and other vital information. However, this malware continues to evolve to become more dangerous. Now, according to Sophos, the number of applications targeted by this malware has increased to include web browsers, email clients, VPN clients, and other software that save usernames and passwords.

As of December, Agent Tesla had been accounted for 20 percent of malicious email attachments. This had conclusion had been brought to light as SophosLabs had tracked multiple threat actors that use the malware.

sophos agent tesla

The Evolved Version of Agent Tesla

SophosLabs have found the two currently active versions of Agent Tesla – Version 2 and Version 3. Both versions of the malware can communicate over HTTP, SMTP, and FTP. However, version 3 adds a Telegram chat protocol. This allows the attackers to retrieve stolen data, and then store it in a Telegram private chat room.

As well as this, attackers can decide whether they want to deploy a Tor client. This helps the attacker conceal their communications. More data can be stolen by Agent Tesla version 3 through the Windows system clipboard.

However, the most common form of delivery of the Agent Tesla malware is through malicious spam mail. So, if you do happen to receive an email from an unknown individual, you should treat those attachments with caution. Sophos recommends that you verify the integrity of the attachments/files before you open them. It’s better to be safe than sorry.

cheap replica watches under $60 enthusiastic by a very late 25th century euro larger railway trail station inside of the corridor of a ribs dome.

where to buy used sexdoll?

intro to diamond art kits.

About ReadWrite’s Editorial Process

The ReadWrite Editorial policy involves closely monitoring the tech industry for major developments, new product launches, AI breakthroughs, video game releases and other newsworthy events. Editors assign relevant stories to staff writers or freelance contributors with expertise in each particular topic area. Before publication, articles go through a rigorous round of editing for accuracy, clarity, and to ensure adherence to ReadWrite's style guidelines.

Get the biggest tech headlines of the day delivered to your inbox

    By signing up, you agree to our Terms and Privacy Policy. Unsubscribe anytime.

    Tech News

    Explore the latest in tech with our Tech News. We cut through the noise for concise, relevant updates, keeping you informed about the rapidly evolving tech landscape with curated content that separates signal from noise.

    In-Depth Tech Stories

    Explore tech impact in In-Depth Stories. Narrative data journalism offers comprehensive analyses, revealing stories behind data. Understand industry trends for a deeper perspective on tech's intricate relationships with society.

    Expert Reviews

    Empower decisions with Expert Reviews, merging industry expertise and insightful analysis. Delve into tech intricacies, get the best deals, and stay ahead with our trustworthy guide to navigating the ever-changing tech market.