Hackers are exploiting an old Microsoft Office vulnerability (CVE-2017-11882) to deploy the Agent Tesla malware through decoy Excel documents in phishing campaigns, Zscaler ThreatLabz reports. The concealed DLL is injected into RegAsm.exe, the Windows Assembly Registration Tool, to launch the final payload. Other discovered phishing campaigns target the hospitality sector with email messages to distribute information stealer malware such as RedLine Stealer or Vidar Stealer.
![](https://healsecurity.com/wp-content/uploads/2024/07/group-ibs-threat-intelligence-and-defence-centre-equip-undergraduates-with-sophisticated.jpg)
Group-IB’s Threat Intelligence and Defence Centre Equip Undergraduates with Sophisticated Cybersecurity Technologies to Boost Threat Analysis and Enhance Cyber Resilience for Campus Start-ups
Hey there from the heart of the San Francisco Bay Area! It’s an absolute pleasure to have you back again for our chat on some