During routine detection monitoring from our Advanced Threat Defense technology, Bitdefender researchers found an interesting spike in malware activity that involved using Microsoft binaries in the infection process, as well as GitHub and Google Drive for delivering payloads. After analyzing the detection details, we identified this activity as a resurgence of the Astaroth spyware, a Trojan and information stealer known since late 2017.
What sets this Astaroth campaign apart is the use of native Microsoft tools – commonly known as “living off the land” – to avoid detection by traditional security solutions, as well as the fact that it specifically targets Brazil by checking for a Brazilian location and a Portuguese-language keyboard before activating. Bitdefender telemetry shows that 92.61 percent of users targeted by this May 2019 Astaroth campaign are in Brazil.
Astaroth logs keystrokes only when a victim uses Internet Explorer (IE) and browses to specific Brazilian banks or businesses, and will even terminate Chrome or Firefox executables to make sure the victim uses IE. Our investigation also revealed that threat actors seem to use multiple versions of the same malware and host them on multiple websites.
Key Findings:
For a more detailed technical analysis, please check out the technical paper below:
tags
Liviu Arsene is the proud owner of the secret to the fountain of never-ending energy. That's what's been helping him work his everything off as a passionate tech news editor for the past few years.
View all postsJune 08, 2023
May 02, 2023
January 11, 2023
January 05, 2023