Astaroth: A trojan disguised as an image can infect PC and steals your data

2 Mins read

A trojan disguised as an image can infect PCs and avoid being recognized by antivirus. Here’s how Astaroth works

A trojan disguised as an image can infect PCs and avoid being recognized by antivirus. Here's how Astaroth works

In these days, a new hacker campaign with the Astaroth trojan , already known to security experts because it has infected thousands of computers around the world in the last three months of 2018, is underway in Brazil and Europe . infection starts from a false image, spread by email.

The new strain of the trojan was discovered by Cybereason researchers and also uses BITSAdmin , an official utility of Microsoft Windows designed to facilitate the operations of downloading or uploading, but used by the trojan to download malicious code. This variant of Astaroth is distributed through spam email campaigns and the infection begins with the opening by the user of an archive in .7zip format attached to the email or inserted in a link or, in fact, in a Gif or Jpg image. The malicious archive contains a .lnk file that starts the actual infection. Subsequently, the malware connects to a server and begins to steal information on the infected computer. Then use BITSAdmin to fetch other images and files from another server.

Immune to antiviruses

The very dangerous thing about Astaroth, and the novelty compared to previous infections based on this trojan, is its ability to modify, injecting a malicious code, a .dll file used by the Avast antivirus. Through this file, after having infected it, the trojan manages to steal other information about the machine it is running on and to download other code. Moreover, it also manages to hide itself in case of an antivirus scan carried out with Avast.

What Astaroth does

The Cybereason research team has discovered that once the trojan has successfully infiltrated, it records user keystrokes, intercepts their calls to the operating system and continually gathers all the information saved to the clipboard . With these methods, it collects significant amounts of personal information, including those on the user’s bank accounts. And if the infected PC is connected to a LAN, Astaroth can also collect the network access passwords of all the other computers connected to the same LAN, the email account passwords, the Messenger account data, the password Internet Explorer.

Astaroth first appeared online in 2017, and then infected thousands of PCs, especially in South America. He had several evolutions before arriving at the current one. An earlier version, for example, was hidden in fake Amazon emails containing confirmations of orders never made by the user. But if the user clicked on the links contained in the email the infection started.

581 posts

About author
Professional writer with more than 7 years of experience. Joseph has worked as a content creator and editor on different web pages. He has been coordinator and content manager in various editorial teams. He also has extensive experience in SEO and digital marketing.
Related posts
Privacy ProtectionSecurity

The best ways to protect your sensitive data of the smartphone

2 Mins read
The advancement of technology, the benefits of the Internet and the possibilities offered by the different apps that currently exist, allow us…

Delete these 23 dangerous fleeceware apps from your smartphone now

3 Mins read
They returned, but no one missed them. What are we talking about? Of the fleeceware apps, a particular type of applications capable…

Discovered 148 vulnerabilities affecting Android smartphones: the list

2 Mins read
When you buy an Android smartphone, you rarely have installed a pure version of the Google operating system . Unless you buy…
Power your team with InHype

We don't send spam mails to any of our subscriber. So, relax and subscribe our latest blogs.