Cybersecurity researchers have unveiled details regarding a sophisticated campaign, codenamed “Boto Cor-de-Rosa” by the Acronis Threat Research Unit, utilizing WhatsApp as the primary distribution vector for the Astaroth Windows banking trojan. This attack specifically targets users in Brazil.
The mechanism is alarming: once the malware successfully infects a Windows machine, it immediately retrieves the victim’s entire WhatsApp contact list. It then executes an auto-messaging function, sending malicious payloads to every contact, thus ensuring rapid and automated propagation, characteristic of a worm.
While Astaroth is historically a conventional banking trojan focused on traditional financial data, the implications for Web3 users are significant. The compromise of a primary device (PC or mobile, via synchronized contact lists) provides attackers with an entry point to sensitive data, including stored wallet credentials, seed phrases, and private keys often saved locally or accessible via browser extensions.
This incident serves as a critical reminder for the Web3 community that robust perimeter security, extending beyond smart contract audits to include endpoint protection and vigilance against social engineering via pervasive messaging apps, is indispensable for safeguarding digital assets.
Source: WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging



コメント