Partners:

Quark
Polskie Stowarzyszenie Bitcoin

Advanced Agent Tesla: Revealing Cybercriminals’ Actions and Identification

Check Point exposes cybercriminal activities related to Agent Tesla, an advanced Remote Access Trojan. Known as "Bignosa" and "Gods," hackers targeted US and Australian organizations via spam emails. Identified as Nosahare Godson and Kingsley Fredrick, the perpetrators face potential legal consequences. Check Point advises vigilance and trace analysis for cybersecurity protection.

Check Point Reveals Cybercriminal Activities Linked to Agent Tesla

Check Point has conducted a study on a malicious software named Agent Tesla, exposing the actions of cybercriminals from the “Bignosa” and “Gods” groups.

Agent Tesla – Advanced Remote Access Trojan

Agent Tesla is an advanced Remote Access Trojan (RAT) specializing in stealing information from infected machines. The campaign associated with this malicious software targeted mainly organizations in the USA and Australia, starting on November 7, 2023.

Methods of Spreading Agent Tesla

The cybercriminals, operating under the aliases “Bignosa” and “Gods,” spread Agent Tesla mainly through spam emails, impersonating business proposals. They also utilized a tool called Cassandra Protector to conceal the malicious code, thereby increasing the success of infiltration.

Identification of Perpetrators and Their Collaboration

Check Point revealed the hackers’ identities – “Bignosa” was identified as Nosahare Godson from Kenya, while “Gods” was identified as Kingsley Fredrick from Nigeria. Initially, it was believed that there was a mentor-student relationship between them, but further discoveries indicate a closer collaboration as a group.

Online Traces and Collaboration with Law Enforcement

The cybercriminals left numerous digital traces online, allowing researchers at Check Point to discover their identities. The company is currently collaborating with law enforcement agencies, which may lead to official charges and arrests of the perpetrators.

Cybersecurity Recommendations

Check Point’s study emphasizes the need for a vigilant approach to cybersecurity and leveraging digital trace analysis to identify threats. It is recommended to regularly update operating systems and applications and exercise caution with unexpected emails to minimize the risk of infection by malicious software such as Agent Tesla.