Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: AgentTesla

Answers to Unit 42 Wireshark Quiz, January 2023The text Wireshark Quiz in orange set across a screenshot of the Wireshark program.
52,938
people reacted

Answers to Unit 42 Wireshark Quiz, January 2023

  • By Brad Duncan
  • January 23, 2023 at 6:00 AM

10

6 min. read

Unit 42 Wireshark Quiz, January 2023The text Wireshark Quiz in orange set across a screenshot of the Wireshark program.
58,962
people reacted

Unit 42 Wireshark Quiz, January 2023

  • By Brad Duncan
  • January 20, 2023 at 6:00 AM

14

4 min. read

Trending

  • Unit 42 Attack Surface Threat Research: Constant Change in Cloud Contributes to 45% of New High/Critical Exposures Per Month by Unit 42
  • Threat Group Assessment: Muddled Libra (Updated) by Unit 42
  • Wireshark Tutorial: Display Filter Expressions by Brad Duncan
  • Wireshark Tutorial: Changing Your Column Display by Brad Duncan
  • Threat Group Assessment: Turla (aka Pensive Ursa) by Unit 42
OriginLogger: A Look at Agent Tesla’s SuccessorA conceptual image representing malware such as OriginLogger
71,191
people reacted

OriginLogger: A Look at Agent Tesla’s Successor

  • By Jeff White
  • September 13, 2022 at 6:00 AM

48

14 min. read

Weaponization of Excel Add-Ins Part 2: Dridex Infection Chain Case StudiesA conceptual image representing targeted attacks, including the XLL Files and Dridex infection chain discussed here.
45,758
people reacted

Weaponization of Excel Add-Ins Part 2: Dridex Infection Chain Case Studies

  • By Saqib Khanzada
  • May 19, 2022 at 12:00 PM

21

8 min. read

Harmful Help: Analyzing a Malicious Compiled HTML Help File Delivering Agent TeslaA conceptual image representing malicious email, which can often come with suspicious attachments such as the Compiled HTML Help file delivering Agent Tesla discussed here.
37,738
people reacted

Harmful Help: Analyzing a Malicious Compiled HTML Help File Delivering Agent Tesla

  • By Tyler Halfpop
  • May 12, 2022 at 3:00 PM

28

4 min. read

Weaponization of Excel Add-Ins Part 1: Malicious XLL Files and Agent Tesla Case StudiesA conceptual image representing targeted attacks, including the type of malware discussed here, dropped by Excel add-ins and Office 4.0 macros.
67,070
people reacted

Weaponization of Excel Add-Ins Part 1: Malicious XLL Files and Agent Tesla Case Studies

  • By Yaron Samuel
  • January 25, 2022 at 6:00 AM

8

8 min. read

SilverTerrier: 2019 Nigerian Business Email Compromise Update
38,607
people reacted

SilverTerrier: 2019 Nigerian Business Email Compromise Update

  • By Peter Renals
  • March 31, 2020 at 6:00 AM

84

15 min. read

40,162
people reacted

Analyzing the Various Layers of AgentTesla’s Packing

  • By Jeff White
  • September 25, 2017 at 10:00 AM

14

10 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.