Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Cyber Security

WhatsApp compromise leads to Astaroth deployment – Sophos News

Cyberinchief by Cyberinchief
November 23, 2025
Reading Time: 5 mins read
0
WhatsApp compromise leads to Astaroth deployment – Sophos News


RELATED POSTS

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

Warning: React2Shell vulnerability already being exploited by threat actors

Sophos analysts are investigating a persistent, multi-stage malware distribution campaign targeting WhatsApp users in Brazil. First observed on September 24, 2025, the campaign (tracked as STAC3150) delivers archive attachments containing a downloader script that retrieves multiple second-stage payloads. In early October, Counter Threat Unit™ (CTU) researchers detailed activity associated with a separate Brazil-based campaign in which the threat actors leveraged WhatsApp to deploy the Maverick banking trojan for credential theft.

In STAC3150, the second-stage payloads include a script that collects WhatsApp contact information and session data, and an installer that deploys the Astaroth (also known as Guildma) banking trojan (see Figure 1).Diagram showing the STAC3150 attack chain that begins with WhatsApp phishingFigure 1: Attack chain in the WhatsApp STAC3150 campaign

Attack progression

The attacks start with a message that is sent using the WhatsApp “View Once” option (see Figure 2).WhatsApp lure in Portuguese, along with English translation

Figure 2: WhatsApp lure (left) and translation (right)

The lure delivers a ZIP archive that contains a malicious VBS or HTA file. When executed, this malicious file launches PowerShell to retrieve second-stage payloads, including a PowerShell or Python script that collects WhatsApp user data and, in later cases, an MSI installer that delivers the Astaroth malware. Figure 3 shows the changes in downloader scripts and second-stage files over the course of the campaign.

Changes in file formats used in STAC3150 campaign

Buy JNews
ADVERTISEMENT

Figure 3: File formats used in the STAC3150 campaign between September 24 and October 31, 2025

In late September incidents, Sophos analysts observed PowerShell being used to retrieve the second-stage payloads via IMAP from an attacker-controlled email account. In early October, the campaign shifted to HTTP-based communication, leveraging PowerShell’s Invoke-WebRequest command to contact a remote command and control (C2) server hosted on https: //www . varegjopeaks . com (see Figure 4).

Display of PowerShell commands launched from malicious VBS file

Figure 4: First-stage PowerShell commands launched from malicious VBS file

The downloaded second-stage PowerShell or Python script (see Figure 5) uses the Selenium Chrome WebDriver and the WPPConnect JavaScript library to hijack WhatsApp Web sessions, harvest contact information and session tokens, and facilitate spam distribution.

Extracts of PowerShell and Python scripts used to collect WhatsApp data

Figure 5: PowerShell (left) and Python (right) scripts for WhatsApp data collection

In late October, the second-stage files began to also include an MSI file (installer.msi) that delivers Astaroth malware.  The installer file writes files to disk and creates a startup registry key to maintain persistence. When executed, it launches the Astaroth malware via a malicious AutoIt script that masquerades as a .log file (see Figure 6). The malware communicates with a C2 server hosted at manoelimoveiscaioba . com.

AutoIT payload execution command

Figure 6: AutoIt payload execution

Victimology

Sophos analysts observed this campaign affecting more than 250 customers, with approximately 95% of the impacted devices located in Brazil. The rest were located in other Latin American countries, the U.S., and Austria (see Figure 7).

Map showing locations of impacted Sophos customer devices

Figure 7: Distribution of Sophos customer devices impacted by the WhatsApp campaign deploying Astaroth between October 23 and October 28, 2025

Recommendations, detections, and indicators

Organizations should educate employees about the risks of opening archive attachments sent via social media and instant messaging platforms, even if received from known contacts.

SophosLabs has developed the countermeasures in Table 1 to detect activity associated with this threat.

Name Description
VBS/DwnLdr-ADJT Detection for initial VBS file
VBS/DwnLdr-ADJW Detection for initial VBS file
VBS/DwnLdr-ADJS Detection for second-stage VBS file
Troj/Mdrop-KEP Detection for second-stage MSI file
Troj/Mdrop-KES Detection for second-stage MSI file
Troj/AutoIt-DJB Detection for AutoIt payload
Troj/HTADrp-CE Detection for HTA script

Table 1: Sophos detections associated with this threat

The threat indicators in Table 2 can be used to detect activity related to this threat. The domains may contain malicious content, so consider the risks before opening them in a browser.

Indicator Type Context
manoelimoveiscaioba[.]com Domain name C2 server used in WhatsApp STAC3150 campaign
varegjopeaks[.]com Domain name C2 server used in WhatsApp STAC3150 campaign
docsmoonstudioclayworks[.]online Domain name C2 server used in WhatsApp STAC3150 campaign
shopeeship[.]com Domain name C2 server used in WhatsApp STAC3150 campaign
miportuarios[.]com Domain name C2 server used in WhatsApp STAC3150 campaign
borizerefeicoes[.]com Domain name C2 server used in WhatsApp STAC3150 campaign
clhttradinglimited[.]com Domain name C2 server used in WhatsApp STAC3150 campaign
lefthandsuperstructures[.]com Domain name C2 server used in WhatsApp STAC3150 campaign

Table 2: Indicators for this threat



Source link

Tags: AstarothcompromiseDeploymentleadsNewsSophosWhatsApp
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security
Cyber Security

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

December 8, 2025
Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data
Cyber Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

December 8, 2025
Warning: React2Shell vulnerability already being exploited by threat actors
Cyber Security

Warning: React2Shell vulnerability already being exploited by threat actors

December 7, 2025
News brief: RCE flaws persist as top cybersecurity threat
Cyber Security

News brief: RCE flaws persist as top cybersecurity threat

December 7, 2025
Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cyber Security

Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

December 6, 2025
GOLD BLADE’s strategic evolution – Sophos News
Cyber Security

GOLD BLADE’s strategic evolution – Sophos News

December 6, 2025
Next Post
SCAM Alert! ⚠️ Shriya Saran & Rukmini Vasanth WARN Fans About Impersonators | Cyber Crime Tollywood

SCAM Alert! ⚠️ Shriya Saran & Rukmini Vasanth WARN Fans About Impersonators | Cyber Crime Tollywood

What Are Examples of TAILGATING in Cyber Security? See How to Prevent?

What Are Examples of TAILGATING in Cyber Security? See How to Prevent?

Recommended Stories

Security vulnerability identified in EV charging protocol – Lifeboat News: The Blog

Security vulnerability identified in EV charging protocol – Lifeboat News: The Blog

November 21, 2025
How to Connect Ethernet – Secure, Fast & Reliable Network Setup

How to Connect Ethernet – Secure, Fast & Reliable Network Setup

December 4, 2025
Scattered Lapsus$ Hunters Tied to Targeting of Zendesk Users

Scattered Lapsus$ Hunters Tied to Targeting of Zendesk Users

November 29, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested