A threat actor known as SWEED is using typosquatting and User Account Control (UAC) bypassing techniques to distribute Agent Tesla and other malware.

Cisco Talos, which has been tracking SWEED’s efforts to distribute Agent Tesla since 2017, observed the threat actor employing various tactics to propel its attack campaigns, including using Java-based droppers and steganography to secretly decode a chain of .NET executables. The actor also incorporated previously disclosed Microsoft Office vulnerabilities, most notably CVE-2017-8759 and CVE-2017-11882, into its attack campaigns before resorting to Office macros and AutoIt droppers in 2019.

Over the course of all of those operations, the threat actor kept some things the same. For example, SWEED commonly creates registry keys to help its malware payloads bypass UAC on infected systems to evade detection, and uses typosquatting with domains specifically created to host packed Agent Tesla binaries.

The History of Agent Tesla Campaigns

In August 2016, Zscaler observed an Agent Tesla campaign that leveraged typosquatting to deliver the information stealer. More than a year later, Fortinet came across an operation that used Microsoft Word documents to deliver a new variant of the spyware. That was just a few months before Cisco Talos spotted an attack in which bad actors modified a well-known exploit chain to deliver the malware along with the Loki information stealer.

Stay One Step Ahead of SWEED

Security professionals can help defend their organizations against SWEED and Agent Tesla by using ahead-of-threat detection to block potentially malicious domains, including those activated by SWEED and other threat actors, before they become active in attacks such as phishing campaigns. Organizations can also invest in a unified endpoint management (UEM) solution to analyze how devices are behaving and report suspicious behavior.

More from

Did Brazil DSL Modem Attacks Change Device Security?

From 2011 to 2012, millions of Internet users in Brazil fell victim to a massive attack against vulnerable DSL modems. By configuring the modems remotely, attackers could redirect users to malicious domain name system (DNS) servers. Victims trying to visit popular websites (Google, Facebook) were instead directed to imposter sites. These rogue sites then installed malware on victims' computers. According to a report from Kaspersky Lab Expert Fabio Assolini citing statistics from Brazil's Computer Emergency Response Team, the attack ultimately…

Who Carries the Weight of a Cyberattack?

Almost immediately after a company discovers a data breach, the finger-pointing begins. Who is to blame? Most often, it is the chief information security officer (CISO) or chief security officer (CSO) because protecting the network infrastructure is their job. Heck, it is even in their job title: they are the security officer. Security is their responsibility. But is that fair – or even right? After all, the most common sources of data breaches and other cyber incidents are situations caused…

Transitioning to Quantum-Safe Encryption

With their vast increase in computing power, quantum computers promise to revolutionize many fields. Artificial intelligence, medicine and space exploration all benefit from this technological leap — but that power is also a double-edged sword. The risk is that threat actors could abuse quantum computers to break the key cryptographic algorithms we depend upon for the safety of our digital world. This poses a threat to a wide range of critical areas. Fortunately, alternate cryptographic algorithms that are safe against…

Securing Your SAP Environments: Going Beyond Access Control

Many large businesses run SAP to manage their business operations and their customer relations. Security has become an increasingly critical priority due to the ongoing digitalization of society and the new opportunities that attackers exploit to achieve a system breach. Recent attacks related to corrupt data, stealing personal information and escalating privileges for remote code execution all highlight the new and varied entry points threat actors have taken advantage of. Attackers with the appropriate skills could be able to exploit…