When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

That allows it to execute code with user privileges but without further user interaction or consent.

The infection is a multi-step process, with the first step being an obfuscated Visual Basic Script.

Petya nagscreen

It downloads a malicious JPG file carrying a Base64-encoded DLL file.

After gathering the requiredintel, Agent Tesla can communicate with its remote C2 server and extract the data quietly.

Both the infostealing malware and the Excel vulnerability seem to be extremely popular these days.

More from TechRadar Pro