Astaroth Banking Malware Resurfaces in Brazil by way of Spear-Phishing Assault

Oct 16, 2024Ravie LakshmananCyber Assault / Banking Trojan

A brand new spear-phishing marketing campaign concentrating on Brazil has been discovered delivering a banking malware referred to as Astaroth (aka Guildma) by making use of obfuscated JavaScript to slide previous safety guardrails.

“The spear-phishing campaign’s impact has targeted various industries, with manufacturing companies, retail firms, and government agencies being the most affected,” Development Micro stated in a brand new evaluation.

“The malicious emails often impersonate official tax documents, using the urgency of personal income tax filings to trick users into downloading the malware.”

The cybersecurity firm is monitoring the menace exercise cluster below the identify Water Makara. It is value stating that Google’s Risk Evaluation Group (TAG) has assigned the moniker PINEAPPLE to an identical intrusion set that delivers the identical malware to Brazilian customers.

Cybersecurity

Each these campaigns share a degree of commonality in that they begin with phishing messages that impersonate official entities resembling Receita Federal and purpose to trick recipients into downloading a ZIP archive attachment that masquerades as earnings tax paperwork.

Current inside the dangerous ZIP file is a Home windows shortcut (LNK) that abuses mshta.exe, a reputable utility meant to run HTML Utility information, execute obfuscated JavaScript instructions and set up connections to a command-and-control (C2) server.

Astaroth Banking Malware

“While Astaroth might seem like an old banking trojan, its reemergence and continued evolution make it a persistent threat,” the researchers stated.

“Beyond stolen data, its impact extends to long-term damage to consumer trust, regulatory fines, and increased costs from business disruption and downtime as well as recovery and remediation.”

To mitigate the danger posed by such assaults, it is beneficial to implement sturdy password insurance policies, use multi-factor authentication (MFA), preserve safety options and software program up to date, and apply the precept of least privilege (PoLP).

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.

Recent articles