Home » today » Technology » Autumn Surge: Agent Tesla Malware Targets Crypto Investors and Apple Devices in Czech Republic

Autumn Surge: Agent Tesla Malware Targets Crypto Investors and Apple Devices in Czech Republic

The scary part is that Agent Tesla attacks in waves. So, as it seems now, a new one comes again with the autumn. This is also reflected by the data of security experts.

According to statistics, this uninvited visitor attacked earlier, when it increased from 13.48% in May to 29.15% in viral statistics in June. During the summer, however, the agent Tesla began to weaken again. In July, its share was only 12.03%, and in August even only 6.96%.

Cyber ​​​​crooks are after cryptocurrencies. In the Czech Republic and Slovakia, it targets Apple devices

Safety

Every 12th attack on Windows

However, according to the latest statistics published by Eset, the sector is growing again. In September, this malware accounted for 8.08% of the threats detected related to the Windows platform. In other words, this means that Agent Tesla was behind every 12th interception attack in the Czech Republic.

Agent Tesla is a typical representative of spy malware – known as spyware – that aims to steal passwords. In fact, this uninvited visitor is only attacking the Czech Republic, it is one of the most widespread long-term threats worldwide.

“Spyware is the biggest threat to the passwords we store in internet browsers. Web browsers are not adequately protected against spyware attacks. The attackers then profit from the data obtained in this way, sell the login data themselves, or from the ransom to provide the services again,” he warned. to Martin Jirkal, head of the research team at the Prague research branch of Eset.

Be careful with executable files

The Tesla agent is usually distributed as an attachment in unsolicited emails. In August, it was usually a link called “Command 240916.exe”. If we find an executable file with this extension in the attachment, we should not open the attachment at all – on the contrary, these emails must be deleted immediately.

Malicious codes are usually spread on the Windows platform only through executable files in attachments of unsolicited e-mails, such as The news warned earlier.

How to protect PCs and mobile phones against hackers?

Hackers are always looking for new ways to get into people’s computers. At the same time, they are increasingly trying to inject malicious codes into mobile phones and tablets.

Cybercriminals try to get into mobile devices in almost the same way as classic computers. They look for bugs in various applications and operating systems that would allow an attacker to enter a foreign machine.

Hackers also rely on users to underestimate the risks. Almost everyone runs an antivirus program on classic computers, but this is not the case with mobile phones and tablets. So nothing stands in the way of computer hackers. We advise you on how to protect individual devices.

“Someone wants to lend you a loan.” The Hodonínsk Trustees lost four million

Safety

2024-10-25 14:33:00
#Tesla #agent #gaining #strength #security #experts #warn #News #World

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.