Over the past year, the Astaroth infostealer trojan has evolved into one of today’s stealthiest malware strains, containing a slew of anti-analysis and anti-sandbox checks to prevent security researchers from detecting and analysing its operations. The malware has historically targeted Brazilian users ever since it was first spotted in the wild in September 2018.
IBM researchers were the first ones to detect and analyse the malware, followed by Cybereason, and then Microsoft, which analysed its evolution across two separate blog posts, in July 2019 and March 2020.
Astaroth now uses YouTube channel descriptions to hide the URL for its command and control (C2) servers.
Astaroth malware hides command and control (C&C) servers inside YouTube channel descriptions
The malware has continued to evolve into a dangerous threat. Luckily, it's only spreading in Brazil only, right now.https://t.co/b0AEY29Pbt pic.twitter.com/LRLCBhK4y6
— Catalin Cimpanu (@campuscodi) May 12, 2020
Experts Comments
Be part of our growing Information Security Expert Community (1000+), please register here.
Linkedin Message
@Niamh Muldoon, Senior Director of Trust and Security, EMEA, provides expert commentary at @Information Security Buzz.
"The return of this stealthy malware, Astaroth, is concerning...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-comments-on-astaroth-malware
Facebook Message
@Niamh Muldoon, Senior Director of Trust and Security, EMEA, provides expert commentary at @Information Security Buzz.
"The return of this stealthy malware, Astaroth, is concerning...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-comments-on-astaroth-malware