Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Astaroth Banking Trojan Exploits WhatsApp Worm for Global Spreading in Brazil



The Astaroth banking Trojan has evolved into a new campaign dubbed Boto Cor-de-Rosa, leveraging WhatsApp for propagation and spreading itself globally. This development highlights the growing sophistication of threat actors and underscores the importance of user vigilance and layered defenses in protecting against emerging cyber threats.

  • The Astaroth banking Trojan has evolved into a new campaign dubbed Boto Cor-de-Rosa, using WhatsApp for propagation.
  • The malware leverages an obfuscated VBScript to spread itself across Brazil and beyond.
  • The attack chain begins with a malicious WhatsApp message carrying a ZIP file that downloads additional payloads and installs the Astaroth banking malware.
  • The malware harvests contacts and sends infected ZIP files using social engineering tactics.
  • The use of WhatsApp demonstrates how attackers can quickly pivot to new channels and exploit vulnerabilities in messaging apps to spread malware.
  • Users and organizations must remain vigilant and take proactive steps to protect themselves against emerging threats like Boto Cor-de-Rosa.



  • A recent development in the realm of cybercrime has seen the Astaroth banking Trojan, a long-running malware known to have been wreaking havoc on Brazilian financial systems, evolve into a new campaign dubbed Boto Cor-de-Rosa. This latest iteration of the malware has leveraged the popular messaging platform WhatsApp for its propagation, using a worm-like mechanism to spread itself across Brazil and beyond.

    According to reports published by Acronis, the Astaroth banking Trojan's new campaign relies on an obfuscated VBScript hidden in a malicious WhatsApp ZIP file. Once opened, the script downloads and runs two components: the Astaroth banking malware and a Python-based WhatsApp spreader. This dual-component approach marks a significant evolution in the malware's modus operandi, as it now combines traditional social engineering tactics with the emerging threat of messaging platform-based propagation.

    The attack chain begins with a malicious WhatsApp message carrying a ZIP file, which is opened by the victim. Upon opening, the script runs and downloads additional payloads, ultimately leading to the installation of the Astaroth banking malware on the infected device. This malware harvests the victim's contact list and automatically sends infected ZIP files using casual, localized messages in Portuguese, adapted to the time of day.

    The spreader also tracks delivery statistics in real-time and exfiltrates contacts to a remote server, combining social engineering with automated propagation. This self-reinforcing propagation loop enables the malware to continue spreading itself at an alarming rate, making it all the more challenging for individuals and organizations to defend against this modern threat.

    Notably, the Astaroth banking Trojan's new campaign demonstrates how banking malware is evolving by mixing credential theft with social engineering and messaging-based propagation. This development underscores the importance of user vigilance, particularly when receiving unsolicited files through messaging platforms, as well as the need for organizations to deploy layered defenses that monitor both traditional attack vectors and emerging social-engineering techniques.

    Furthermore, this campaign highlights the growing sophistication and adaptability of threat actors in the cybercrime landscape. The use of WhatsApp, a platform once considered secure and private, demonstrates how attackers can quickly pivot to new channels and exploit vulnerabilities in messaging apps to spread malware. As such, it is imperative that users and organizations remain vigilant and take proactive steps to protect themselves against emerging threats like this.

    In conclusion, the Astaroth banking Trojan's latest campaign serves as a stark reminder of the ever-evolving nature of cybercrime. By combining traditional social engineering tactics with messaging platform-based propagation, this malware has managed to spread itself rapidly across Brazil and beyond. As threat actors continue to adapt and innovate in their pursuit of financial gain, it is crucial that we remain vigilant and proactive in our defenses against these emerging threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Astaroth-Banking-Trojan-Exploits-WhatsApp-Worm-for-Global-Spreading-in-Brazil-ehn.shtml

  • https://securityaffairs.com/186685/malware/astaroth-banking-trojan-spreads-in-brazil-via-whatsapp-worm.html

  • https://thehackernews.com/2026/01/whatsapp-worm-spreads-astaroth-banking.html

  • https://siliconangle.com/2026/01/08/astaroth-banking-malware-returns-whatsapp-based-worm-targeting-brazil/


  • Published: Thu Jan 8 14:07:39 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us