Malevolent Astaroth Banking Malware Emerges Again in Brazil Through Targeted Spear-Phishing Attack

Oct 16, 2024Ravie LakshmananCyber Attack / Banking Trojan

A fresh spear-phishing operation aimed at Brazil has surfaced that sends out a banking malicious software known as Astaroth (also referred to as Guildma) by using obscured JavaScript to by

Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack

Oct 16, 2024Ravie LakshmananCyber Attack / Banking Trojan

Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack

A fresh spear-phishing operation aimed at Brazil has surfaced that sends out a banking malicious software known as Astaroth (also referred to as Guildma) by using obscured JavaScript to bypass security protocols.

“The reach of the spear-phishing assault has affected various sectors, with manufacturing businesses, retail companies, and governmental institutions experiencing the most impact,” Trend Micro stated in a recent examination.

“The deceitful emails commonly pose as legitimate tax documents, exploiting the immediacy of personal income tax filings to deceive users into downloading the malware.”

The cybersecurity corporation is monitoring the menace phenomenon cluster under the title Water Makara. It’s important to note that Google’s Threat Analysis Group (TAG) has dubbed the group PINEAPPLE, which operates in a similar manner by transmitting the same malicious software to users in Brazil.

Cybersecurity

Both of these campaigns share a common approach in that they kick off with phishing communications impersonating authoritative bodies like Receita Federal and aiming to deceive recipients into fetching a ZIP bundle attachment disguised as income tax paperwork.

In the malicious ZIP file lies a Windows shortcut (LNK) that misuses mshta.exe, a legitimate tool designed to execute HTML Application files, implement veiled JavaScript directives, and establish links to a command-and-control (C2) server.

Astaroth Banking Malware

“Despite the age of Astaroth, this banking trojan’s resurgence and continuous evolution render it a persistent menace,” the researchers remarked.

“Beside data pilferage, its repercussions encompass enduring harm to consumer trust, fiscal penalties, escalated expenses due to business interruptions and downtime, in addition to the costs of recuperation and correction.”

To reduce the vulnerability to such assaults, it is advised to institute stringent password regulations, leverage multi-factor authentication (MFA), maintain up-to-date security solutions and software, and adopt the principle of least privilege (PoLP).

Found this article intriguing? Follow us on Twitter and LinkedIn to access more exclusive content we publish.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.