Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Purecrypter unfolds Tesla agent and new back in current cyberattacks
Global Security

Purecrypter unfolds Tesla agent and new back in current cyberattacks

AdminBy AdminJanuary 28, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 28, 2025Red LakshmananPhishing -ta / network safety

The actor with the motivated threat was associated with a permanent phishing email, which has been ongoing at least July 2024, specifically focused on users in Poland and Germany.

Attacks led to the deployment of various useful loads such as Tesla’s agent. A snake keyand used to be an unregistered back of Tornet, which is delivered with the help of Purecrypter. Tornet is so named due to what allows the actor the threat to communicate with the victim’s car victim Tor.

“The actor performs the planned task on the victim’s cars – Note in an analysis published today.

Cybersecurity

“The actor also disables the victim’s car from the network before dropping the useful load, and then connect it back into the network, which avoids cloudy anti -oxygen solutions.”

The starting point of the attack is phishing -electronic mail with fake confirmation of money or receipt, and the actor threatens as financial institutions, as well as production and logistics companies. These messages are attached to the .tgz files’ expansion in the likely attempt to avoid detecting.

Opening a compressed email attachment and extracting the contents of the archive leads to a .net loader, which in turn loads and launches Purecrypter directly into memory.

Then the malicious Purecrypter software continues to launch the back of Tornet, but not before conducting a series of anti-Deeber, anti-Nalysis, anti-VM and anti-software on the victim’s car to fly under the radar.

“Backdoor Tornet sets the C2 connection and also connects the victim’s car with the Tor network,” Raghuras said. “He has opportunities to receive and run arbitrary .Net .Net assembly in the victim’s car loaded from the C2 server, increasing the surface of the attack for further invasion.”

Cybersecurity

The disclosure of information takes place a few days after the second half of 2024. In the second half of 2024, there was a surge of e -mail threats that uses hidden text, with the purpose of extracting brands by email and detection engines.

“Hidden texting is a simple but effective technique for bypassing PARSERS by email, confusing spam -filters and evasion of detection engines that count on keywords,” Omid Mirzay Security Research – Note. “The idea is to include some characters in the e -mail source that is not visually recognizable.”

In order to withstand such attacks, it is recommended to develop additional filtering methods that can detect hidden texting and concealing content, including detection of CSS properties such as “visibility” and “display”, and take an approach to detecting a visual similarity (for example ,, such as For example, for example Sand) to expand the possibilities of detection.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.