{"id":6312,"date":"2021-05-12T10:09:22","date_gmt":"2021-05-12T17:09:22","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6312"},"modified":"2024-04-26T13:20:42","modified_gmt":"2024-04-26T20:20:42","slug":"malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\/","title":{"rendered":"Malspam Delivering Agent Tesla Keylogger Spoofs Oil &#038; Gas Co. Messages"},"content":{"rendered":"<h3><strong>Author: Shashank Jain<\/strong><\/h3>\n<h3><strong>TLP: WHITE<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<h3>Overview<\/h3>\n<p>Between 3 and 5 April, Infoblox observed a malicious spam campaign distributing weaponized Microsoft Excel spreadsheets (XLS) containing malicious macros intended to infect victims\u2019 machines with the Agent Tesla keylogger. The threat actor(s) used a spoofed email sender address to gain the victim&#8217;s trust by impersonating Petroham Oil &amp; Gas, a legitimate chemical and petrochemical company based in Abu Dhabi.<\/p>\n<h3>Customer Impact<\/h3>\n<p>Agent Tesla malware is known for its keylogging and credential stealing capabilities, as well as its distribution method as a form of \u201cmalware-as-a-service.\u201d<\/p>\n<p>Infoblox has previously reported on Agent Tesla campaigns in Dec 2020<sup>1<\/sup> and April 2021.<sup>2<\/sup> Both used the same initial attack vector (malspam) and delivery technique (weaponized XLS files containing malicious macros) as this recent campaign.<\/p>\n<h3>Campaign Analysis<\/h3>\n<p>In this campaign, the threat actor(s) used the sender email address <em>sales@oryx-ad[.]ae<\/em> to impersonate the Abu Dhabi-based oil and gas company with the subject line <em>Labour Day holiday RFQ 191938<\/em>. The email bodies are empty but the messages carry an attachment with the filename <em>RFQ 191938.xls,<\/em> as referenced by the subject line. All of the XLS files contained malicious macros.<\/p>\n<h3>Attack Chain<\/h3>\n<p>When the user opens the attachment, they will see the error message \u201cWord experienced an error while trying to open the file.\u201d In the background, cmd.exe (windows legitimate utility) begins to run and executes a PowerShell script via Windows Management Instrumentation (WMI).<\/p>\n<p>The malicious program then creates a scheduled task to achieve persistence and uses the Windows native application aspnet_compiler to compile and connect to the command and control (C&#038;C) server to download the Agent Tesla payload.<sup>3<\/sup> After successful execution of the payload, it starts capturing the victim\u2019s login credentials that have been stored in browsers and registries, while also capturing screenshots using its keylogger abilities.<\/p>\n<h3>Vulnerabilities &#038; Mitigation<\/h3>\n<p>Malspam attachments containing malicious macros are the primary infection vectors for Agent Tesla. Infoblox recommends the following actions to reduce the risk of this type of infection:<\/p>\n<ul>\n<li>Keep computers and all endpoints up-to-date with the latest security patches to block known vulnerabilities that threat actors could target.<\/li>\n<li>Be cautious of emails from unfamiliar senders and inspect unexpected attachments before opening them.<\/li>\n<li>Always be suspicious of vague or empty emails, especially if there is a prompt to open an attachment or click on a link.<\/li>\n<li>Implement attachment filtering to reduce the likelihood of malicious content reaching a user\u2019s workstation.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/threat-intelligence-120.jpg\" alt=\"\" width=\"601\" height=\"575\" class=\"aligncenter size-full wp-image-6558\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threat-intelligence-120.jpg 601w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threat-intelligence-120-300x287.jpg 300w\" sizes=\"auto, (max-width: 601px) 100vw, 601px\" \/><\/p>\n<h3><strong>Endnotes<\/strong><\/h3>\n<ol>\n<li><a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence--100\">https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence&#8211;100<\/a><\/li>\n<li><a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence--116\">https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence&#8211;116<\/a><\/li>\n<li><a href=\"https:\/\/app.any.run\/tasks\/53454313-851f-4203-95ea-ebcbabc8e745\/\">https:\/\/app.any.run\/tasks\/53454313-851f-4203-95ea-ebcbabc8e745\/<\/a><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author: Shashank Jain TLP: WHITE &nbsp; Overview Between 3 and 5 April, Infoblox observed a malicious spam campaign distributing weaponized Microsoft Excel spreadsheets (XLS) containing malicious macros intended to infect victims\u2019 machines with the Agent Tesla keylogger. The threat actor(s) used a spoofed email sender address to gain the victim&#8217;s trust by impersonating Petroham Oil [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":6722,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[553],"tags":[400,258,294],"class_list":{"0":"post-6312","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-campaign-briefs","8":"tag-agent-tesla","9":"tag-keylogger","10":"tag-malspam","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Malspam Delivering Agent Tesla Keylogger Spoofs Oil &amp; Gas Co. Messages<\/title>\n<meta name=\"description\" content=\"Malspam Delivering Agent Tesla Keylogger Spoofs Oil &amp; Gas Co. Messages. Between 3 and 5 April, Infoblox observed a malicious spam campaign distributing weaponized Microsoft Excel spreadsheets (XLS) containing malicious macros intended to infect victims\u2019 machines with the Agent Tesla keylogger. The threat actor(s) used a spoofed email sender address to gain the victim&#039;s trust by impersonating Petroham Oil &amp; Gas, a legitimate chemical and petrochemical company based in Abu Dhabi.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malspam Delivering Agent Tesla Keylogger Spoofs Oil &amp; Gas Co. Messages\" \/>\n<meta property=\"og:description\" content=\"Malspam Delivering Agent Tesla Keylogger Spoofs Oil &amp; Gas Co. Messages. Between 3 and 5 April, Infoblox observed a malicious spam campaign distributing weaponized Microsoft Excel spreadsheets (XLS) containing malicious macros intended to infect victims\u2019 machines with the Agent Tesla keylogger. The threat actor(s) used a spoofed email sender address to gain the victim&#039;s trust by impersonating Petroham Oil &amp; Gas, a legitimate chemical and petrochemical company based in Abu Dhabi.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-12T17:09:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:20:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-33.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Malspam Delivering Agent Tesla Keylogger Spoofs Oil &#038; Gas Co. Messages\",\"datePublished\":\"2021-05-12T17:09:22+00:00\",\"dateModified\":\"2024-04-26T20:20:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\\\/\"},\"wordCount\":438,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-33.jpg\",\"keywords\":[\"agent tesla\",\"keylogger\",\"Malspam\"],\"articleSection\":[\"Cyber Campaign Briefs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\\\/\",\"name\":\"Malspam Delivering Agent Tesla Keylogger Spoofs Oil & Gas Co. Messages\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-33.jpg\",\"datePublished\":\"2021-05-12T17:09:22+00:00\",\"dateModified\":\"2024-04-26T20:20:42+00:00\",\"description\":\"Malspam Delivering Agent Tesla Keylogger Spoofs Oil & Gas Co. Messages. Between 3 and 5 April, Infoblox observed a malicious spam campaign distributing weaponized Microsoft Excel spreadsheets (XLS) containing malicious macros intended to infect victims\u2019 machines with the Agent Tesla keylogger. The threat actor(s) used a spoofed email sender address to gain the victim's trust by impersonating Petroham Oil & Gas, a legitimate chemical and petrochemical company based in Abu Dhabi.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-33.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-33.jpg\",\"width\":612,\"height\":408,\"caption\":\"Big data and hacking concept. Back view of hacker at desktop using creative digital numbers mesh on blurry bokeh background. Multiexposure\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Campaign Briefs\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Malspam Delivering Agent Tesla Keylogger Spoofs Oil &#038; Gas Co. Messages\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Malspam Delivering Agent Tesla Keylogger Spoofs Oil & Gas Co. Messages","description":"Malspam Delivering Agent Tesla Keylogger Spoofs Oil & Gas Co. Messages. Between 3 and 5 April, Infoblox observed a malicious spam campaign distributing weaponized Microsoft Excel spreadsheets (XLS) containing malicious macros intended to infect victims\u2019 machines with the Agent Tesla keylogger. The threat actor(s) used a spoofed email sender address to gain the victim's trust by impersonating Petroham Oil & Gas, a legitimate chemical and petrochemical company based in Abu Dhabi.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\/","og_locale":"en_US","og_type":"article","og_title":"Malspam Delivering Agent Tesla Keylogger Spoofs Oil & Gas Co. Messages","og_description":"Malspam Delivering Agent Tesla Keylogger Spoofs Oil & Gas Co. Messages. Between 3 and 5 April, Infoblox observed a malicious spam campaign distributing weaponized Microsoft Excel spreadsheets (XLS) containing malicious macros intended to infect victims\u2019 machines with the Agent Tesla keylogger. The threat actor(s) used a spoofed email sender address to gain the victim's trust by impersonating Petroham Oil & Gas, a legitimate chemical and petrochemical company based in Abu Dhabi.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\/","og_site_name":"Infoblox Blog","article_published_time":"2021-05-12T17:09:22+00:00","article_modified_time":"2024-04-26T20:20:42+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-33.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Malspam Delivering Agent Tesla Keylogger Spoofs Oil &#038; Gas Co. Messages","datePublished":"2021-05-12T17:09:22+00:00","dateModified":"2024-04-26T20:20:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\/"},"wordCount":438,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-33.jpg","keywords":["agent tesla","keylogger","Malspam"],"articleSection":["Cyber Campaign Briefs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\/","name":"Malspam Delivering Agent Tesla Keylogger Spoofs Oil & Gas Co. Messages","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-33.jpg","datePublished":"2021-05-12T17:09:22+00:00","dateModified":"2024-04-26T20:20:42+00:00","description":"Malspam Delivering Agent Tesla Keylogger Spoofs Oil & Gas Co. Messages. Between 3 and 5 April, Infoblox observed a malicious spam campaign distributing weaponized Microsoft Excel spreadsheets (XLS) containing malicious macros intended to infect victims\u2019 machines with the Agent Tesla keylogger. The threat actor(s) used a spoofed email sender address to gain the victim's trust by impersonating Petroham Oil & Gas, a legitimate chemical and petrochemical company based in Abu Dhabi.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-33.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-33.jpg","width":612,"height":408,"caption":"Big data and hacking concept. Back view of hacker at desktop using creative digital numbers mesh on blurry bokeh background. Multiexposure"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/malspam-delivering-agent-tesla-keylogger-spoofs-oil-gas-co-messages\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Campaign Briefs","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/cyber-campaign-briefs\/"},{"@type":"ListItem","position":4,"name":"Malspam Delivering Agent Tesla Keylogger Spoofs Oil &#038; Gas Co. Messages"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6312"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6312\/revisions"}],"predecessor-version":[{"id":6559,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6312\/revisions\/6559"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6722"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}