• Book Dewayne Hart
  • Dewaynehart@dewaynehart.com
  • (470) 409 8316
  • Speaker Bio
  • Home
  • About
  • Speaker
  • Books
  • Podcast
  • Contact
  • Blog
  • Home
  • About
  • Speaker
  • Books
  • Podcast
  • Contact
  • Blog
Facebook-f Linkedin-in Youtube X-twitter Globe
Order books

Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack

Posted on October 16, 2024 by admin

[ad_1]

Oct 16, 2024Ravie LakshmananCyber Attack / Banking Trojan

Spear-Phishing Attack

A new spear-phishing campaign targeting Brazil has been found delivering a banking malware called Astaroth (aka Guildma) by making use of obfuscated JavaScript to slip past security guardrails.

“The spear-phishing campaign’s impact has targeted various industries, with manufacturing companies, retail firms, and government agencies being the most affected,” Trend Micro said in a new analysis.

“The malicious emails often impersonate official tax documents, using the urgency of personal income tax filings to trick users into downloading the malware.”

The cybersecurity company is tracking the threat activity cluster under the name Water Makara. It’s worth pointing out that Google’s Threat Analysis Group (TAG) has assigned the moniker PINEAPPLE to a similar intrusion set that delivers the same malware to Brazilian users.

Cybersecurity

Both these campaigns share a point of commonality in that they commence with phishing messages that impersonate official entities such as Receita Federal and aim to trick recipients into downloading a ZIP archive attachment that masquerades as income tax documents.

Present within the harmful ZIP file is a Windows shortcut (LNK) that abuses mshta.exe, a legitimate utility meant to run HTML Application files, execute obfuscated JavaScript commands and establish connections to a command-and-control (C2) server.

Astaroth Banking Malware

“While Astaroth might seem like an old banking trojan, its reemergence and continued evolution make it a persistent threat,” the researchers said.

“Beyond stolen data, its impact extends to long-term damage to consumer trust, regulatory fines, and increased costs from business disruption and downtime as well as recovery and remediation.”

To mitigate the risk posed by such attacks, it’s recommended to enforce strong password policies, use multi-factor authentication (MFA), keep security solutions and software updated, and apply the principle of least privilege (PoLP).

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



[ad_2]

Recent Posts

  • From Noise to ROI: Optimizing Cyber Risk Prioritization for Maximum Business Impact
  • Developing a Cybersecurity Mindset: Proactive Defense and Human Behavior Insights
  • How Military Discipline Enhances Cybersecurity Resilience
  • Secure to Scale: 7 Executive Strategies to Align Cybersecurity With Business Growth
  • No Blind Spots: A Veteran’s Blueprint to Protect Critical Infrastructure

Recent Comments

No comments to show.

Archives

  • March 2026
  • February 2026
  • July 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023

Categories

  • Cyber News
  • Uncategorized

Book Dewayne Hart for your next event

  • Dewaynehart@dewaynehart.com
  • (470) 409 8316
Facebook-f Linkedin-in Youtube X-twitter Globe
© 2025 Dewayne Hart | Cybersecurity Leadership & Innovation
no_deposit_bonus