Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Cyber Security News » Vulnerabilities & Exploits » Acronis finds WhatsApp-driven Astaroth banking malware

Acronis finds WhatsApp-driven Astaroth banking malware

Acronis finds WhatsApp-driven Astaroth banking malware

https://etimg.etb2bimg.com/thumb/msid-126526176,imgsize-45466,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/astaroth-malware-exploits-whatsapp-to-target-banking-information.jpg

A new campaign involving the Astaroth banking malware highlights a shift in how financial cybercrime is being distributed. Tracked by security researchers as “Boto Cor-de-Rosa,” the campaign uses WhatsApp Web as a propagation channel, enabling the malware to automatically send infected files to a victim’s personal contacts. By exploiting trusted relationships and everyday messaging behaviour, attackers are able to spread the malware quickly while targeting banking credentials, primarily affecting users in Brazil.

The attack begins when users receive a ZIP file through WhatsApp that appears to be a routine document shared by a known contact. Opening the file triggers a hidden script that installs the malware without clear signs of compromise. Once deployed, the malware operates quietly in the background and establishes persistence on the system.

Following installation, the malware runs two parallel operations. One focuses on propagation by accessing the victim’s WhatsApp contacts and automatically sending malicious files using casual, familiar language intended to appear legitimate. The second functions as a banking trojan, monitoring user activity and activating when financial or banking websites are accessed, enabling credential theft and fraudulent transactions.

The campaign relies heavily on social engineering techniques. Messages are tailored using time-appropriate greetings such as “Good morning,” “Good afternoon,” or “Good evening,” based on the recipient’s local time. This contextualisation makes the messages appear routine and trustworthy, increasing the likelihood that recipients will open the attachment and continue the infection chain.

The malware also includes tracking mechanisms to measure the effectiveness of its spread. It collects victims’ contact lists and records delivery metrics, allowing attackers to monitor reach and adjust propagation strategies in real time. These features point to a high level of organisation and operational maturity behind the campaign.

Although the activity has so far been concentrated in Brazil and uses Portuguese-language messaging, the underlying technique is not region-specific. Similar approaches could be adapted to other languages, regions, and messaging platforms. As instant messaging continues to be widely used for personal and work communication, such platforms are increasingly being leveraged as high-trust channels for malware distribution.

The campaign illustrates a broader trend in cybercrime, where attackers move beyond email-based delivery and take advantage of familiar communication tools to bypass user suspicion and traditional security assumptions.

  • Published On Jan 15, 2026 at 09:05 AM IST

Join the community of 2M+ industry professionals.

Subscribe to Newsletter to get latest insights & analysis in your inbox.

All about ETCISO industry right on your smartphone!




Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

 

 

 

 

 

 

 

 

 

 

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket