Close Menu
geekfence.comgeekfence.com
    What's Hot

    MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide

    December 29, 2025

    How to Maximise Efficiency With a Compact Tractor on a Small Plot

    December 29, 2025

    Designing custom UI with Liquid Glass on iOS 26 – Donny Wals

    December 29, 2025
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»WhatsApp compromise leads to Astaroth deployment – Sophos News
    Cyber Security

    WhatsApp compromise leads to Astaroth deployment – Sophos News

    AdminBy AdminNovember 21, 2025No Comments4 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    WhatsApp compromise leads to Astaroth deployment – Sophos News
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Sophos analysts are investigating a persistent, multi-stage malware distribution campaign targeting WhatsApp users in Brazil. First observed on September 24, 2025, the campaign (tracked as STAC3150) delivers archive attachments containing a downloader script that retrieves multiple second-stage payloads. In early October, Counter Threat Unit™ (CTU) researchers detailed activity associated with a separate Brazil-based campaign in which the threat actors leveraged WhatsApp to deploy the Maverick banking trojan for credential theft.

    In STAC3150, the second-stage payloads include a script that collects WhatsApp contact information and session data, and an installer that deploys the Astaroth (also known as Guildma) banking trojan (see Figure 1).Diagram showing the STAC3150 attack chain that begins with WhatsApp phishingFigure 1: Attack chain in the WhatsApp STAC3150 campaign

    Attack progression

    The attacks start with a message that is sent using the WhatsApp “View Once” option (see Figure 2).WhatsApp lure in Portuguese, along with English translation

    Figure 2: WhatsApp lure (left) and translation (right)

    The lure delivers a ZIP archive that contains a malicious VBS or HTA file. When executed, this malicious file launches PowerShell to retrieve second-stage payloads, including a PowerShell or Python script that collects WhatsApp user data and, in later cases, an MSI installer that delivers the Astaroth malware. Figure 3 shows the changes in downloader scripts and second-stage files over the course of the campaign.

    Changes in file formats used in STAC3150 campaign

    Figure 3: File formats used in the STAC3150 campaign between September 24 and October 31, 2025

    In late September incidents, Sophos analysts observed PowerShell being used to retrieve the second-stage payloads via IMAP from an attacker-controlled email account. In early October, the campaign shifted to HTTP-based communication, leveraging PowerShell’s Invoke-WebRequest command to contact a remote command and control (C2) server hosted on https: //www . varegjopeaks . com (see Figure 4).

    Display of PowerShell commands launched from malicious VBS file

    Figure 4: First-stage PowerShell commands launched from malicious VBS file

    The downloaded second-stage PowerShell or Python script (see Figure 5) uses the Selenium Chrome WebDriver and the WPPConnect JavaScript library to hijack WhatsApp Web sessions, harvest contact information and session tokens, and facilitate spam distribution.

    Extracts of PowerShell and Python scripts used to collect WhatsApp data

    Figure 5: PowerShell (left) and Python (right) scripts for WhatsApp data collection

    In late October, the second-stage files began to also include an MSI file (installer.msi) that delivers Astaroth malware.  The installer file writes files to disk and creates a startup registry key to maintain persistence. When executed, it launches the Astaroth malware via a malicious AutoIt script that masquerades as a .log file (see Figure 6). The malware communicates with a C2 server hosted at manoelimoveiscaioba . com.

    AutoIT payload execution command

    Figure 6: AutoIt payload execution

    Victimology

    Sophos analysts observed this campaign affecting more than 250 customers, with approximately 95% of the impacted devices located in Brazil. The rest were located in other Latin American countries, the U.S., and Austria (see Figure 7).

    Map showing locations of impacted Sophos customer devices

    Figure 7: Distribution of Sophos customer devices impacted by the WhatsApp campaign deploying Astaroth between October 23 and October 28, 2025

    Recommendations, detections, and indicators

    Organizations should educate employees about the risks of opening archive attachments sent via social media and instant messaging platforms, even if received from known contacts.

    SophosLabs has developed the countermeasures in Table 1 to detect activity associated with this threat.

    Name Description
    VBS/DwnLdr-ADJT Detection for initial VBS file
    VBS/DwnLdr-ADJW Detection for initial VBS file
    VBS/DwnLdr-ADJS Detection for second-stage VBS file
    Troj/Mdrop-KEP Detection for second-stage MSI file
    Troj/Mdrop-KES Detection for second-stage MSI file
    Troj/AutoIt-DJB Detection for AutoIt payload
    Troj/HTADrp-CE Detection for HTA script

    Table 1: Sophos detections associated with this threat

    The threat indicators in Table 2 can be used to detect activity related to this threat. The domains may contain malicious content, so consider the risks before opening them in a browser.

    Indicator Type Context
    manoelimoveiscaioba[.]com Domain name C2 server used in WhatsApp STAC3150 campaign
    varegjopeaks[.]com Domain name C2 server used in WhatsApp STAC3150 campaign
    docsmoonstudioclayworks[.]online Domain name C2 server used in WhatsApp STAC3150 campaign
    shopeeship[.]com Domain name C2 server used in WhatsApp STAC3150 campaign
    miportuarios[.]com Domain name C2 server used in WhatsApp STAC3150 campaign
    borizerefeicoes[.]com Domain name C2 server used in WhatsApp STAC3150 campaign
    clhttradinglimited[.]com Domain name C2 server used in WhatsApp STAC3150 campaign
    lefthandsuperstructures[.]com Domain name C2 server used in WhatsApp STAC3150 campaign

    Table 2: Indicators for this threat



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide

    December 29, 2025

    How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

    December 28, 2025

    What are brushing scams and how do I stay safe?

    December 27, 2025

    Black or Scrambled Phone Screen? Here’s How to Spot a Hacked vs Broken Phone

    December 26, 2025

    Closing the gap: bitsIO wins Splunkie Award for data and AI-powered nonprofit solutions

    December 25, 2025

    Google Online Security Blog: Further Hardening Android GPUs

    December 23, 2025
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 20258 Views

    Microsoft 365 Copilot now enables you to build apps and workflows

    October 29, 20258 Views

    Here’s the latest company planning for gene-edited babies

    November 2, 20257 Views
    Don't Miss

    MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide

    December 29, 2025

    Dec 29, 2026Ravie LakshmananDatabase Security / Vulnerability A recently disclosed security vulnerability in MongoDB has…

    How to Maximise Efficiency With a Compact Tractor on a Small Plot

    December 29, 2025

    Designing custom UI with Liquid Glass on iOS 26 – Donny Wals

    December 29, 2025

    Microsoft Azure Is Now Supported By Cloud Development Kits

    December 29, 2025
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide

    December 29, 2025

    How to Maximise Efficiency With a Compact Tractor on a Small Plot

    December 29, 2025

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2025 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.