Current Cyber Threats

Unmasking Agent Tesla: A Deep Dive into a Multi-Stage Campaign

Summary:
A recent deep-dive analysis by FortiGuard Labs has unmasked a sophisticated, multi-stage infection chain used to deliver the Agent Tesla infostealer. The campaign begins with business-themed phishing emails, often using lures such as "New Purchase Orders" to create urgency. Unlike simpler attacks, this campaign utilizes a layered delivery pipeline starting with an obfuscated JSE (JavaScript Encoded) downloader inside a RAR archive. This downloader fetches an encrypted PowerShell script from a public file-hosting service, which subsequently executes a series of in-memory stages. The final payload is injected into legitimate Windows processes using process hollowing, where it performs extensive anti-analysis and virtualization checks before harvesting sensitive data, including browser credentials, cookies, and email client information, for exfiltration via SMTP or FTP.


Security Officer Comments:
This campaign represents a significant risk due to its "Malware-as-a-Service" (MaaS) nature and its high degree of evasion. While Agent Tesla is a well-known threat, the current evolution toward script-based evasion and reflective loading of .NET assemblies means that traditional perimeter defenses focusing on .exe or .bat files may be bypassed. For companies in our Critical SaaS and Semiconductor SIGs, this is particularly concerning; the infostealer’s primary goal is to harvest credentials that could provide threat actors with the initial access needed for secondary objectives, such as intellectual property theft or supply chain compromise. The use of legitimate file-hosting services like catbox.moe to host malicious payloads further complicates detection, as these domains are often not blocked by standard web filters. Organizations should view this not just as a commodity malware threat, but as a sophisticated "front-end" for gaining a foothold in high-value environments.


Suggested Corrections:
To defend against this evolving threat, organizations should adopt a multi-layered security strategy focused on both technical controls and user awareness.
  • Email and Attachment Filtering: Strengthen email security gateway policies to block or scrutinize compressed archives (RAR/ZIP) containing script files like .jse, .vbs, or .js. Implement Content Disarm and Reconstruction (CDR) to sanitize incoming attachments before they reach the end user.
  • Endpoint Detection and Response (EDR): Deploy and fine-tune EDR solutions to monitor for suspicious process behaviors, specifically "process hollowing" (e.g., RegSvcs.exe or vbc.exe spawning with unusual memory modifications). Ensure AMSI (Antimalware Scan Interface) is enabled to catch heavily obfuscated PowerShell scripts at execution time.
  • Network Monitoring and Web Filtering: Audit and restrict access to unauthorized file-hosting sites and "paste" services if they are not required for business operations. Monitor for unusual SMTP or FTP traffic from unauthorized internal workstations, which may indicate data exfiltration.
  • Access Management: Enforce robust Multi-Factor Authentication (MFA) across all corporate accounts. Since Agent Tesla’s primary objective is credential theft, MFA serves as the last line of defense to prevent stolen passwords from being used to access internal systems.
  • User Resilience Training: Conduct targeted phishing simulations using business-process lures (invoices, POs, shipping notices) to educate employees on the dangers of opening unexpected attachments, even when they appear to be routine business communications.
Link(s):
https://www.fortinet.com/blog/threa...ent-tesla-deep-dive-into-multi-stage-campaign