Astaroth Banking Trojan Uses GitHub to Evade Takedowns

Astaroth Banking Trojan Exploits GitHub for Malware Configurations, Targeting Latin America Through Phishing Campaigns

  • The Astaroth banking trojan now uses GitHub to host Malware configurations, improving its ability to continue operating after takedowns.
  • The malware campaign targets primarily Brazil, with activity also reported across Latin American countries.
  • Infections start with phishing emails themed as DocuSign, delivering a zipped Windows shortcut file that installs the malware.
  • Astaroth monitors banking and cryptocurrency websites, logging keystrokes to steal credentials, which are sent using a reverse proxy service.
  • The trojan uses anti-analysis techniques and maintains persistence by setting up startup files and limiting infection to non-English/U.S. system locales.

Security researchers have identified a new campaign distributing the Astaroth banking trojan, which now relies on GitHub repositories to store malware configuration data. This method allows the trojan to remain operational even if its command-and-control (C2) servers are shut down. The campaign was reported on October 13, 2025, with a focus on Brazil and other Latin American countries.

- Advertisement -

According to McAfee Labs researchers Harshil Patel and Prabudh Chakravorty, “Instead of relying solely on traditional command-and-control (C2) servers that can be taken down, these attackers are leveraging GitHub repositories to host malware configurations.” They explained that when authorities disable the main C2 infrastructure, Astaroth simply retrieves fresh configuration files from GitHub to continue its operations. The malware campaign is active in Brazil, Mexico, Uruguay, Argentina, Paraguay, Chile, Bolivia, Peru, Ecuador, Colombia, Venezuela, and Panama.

The infection begins with a DocuSign-themed phishing email that deceives recipients into downloading a zipped Windows shortcut (.lnk) file. This file contains obfuscated JavaScript that fetches additional scripts and files, including an AutoIt script, which loads and executes shellcode to run a malicious Delphi-based DLL. This DLL decrypts and injects the Astaroth malware into a system process named RegSvc.exe.

Astaroth monitors active browser windows every second, specifically looking for visits to banking and cryptocurrency websites. Once such sites are detected, the malware activates keylogging to capture credentials. The stolen data is sent to attackers through the Ngrok reverse proxy service. Some of the targeted sites include caixa.gov[.]br, itau.com[.]br, Binance[.]com, and MetaMask[.]io.

The trojan is designed to avoid detection by shutting down if it detects virtual machines, debuggers, or analysis tools such as IDA Pro and Wireshark. It persists on infected machines by placing a shortcut file in the Windows Startup folder, ensuring it runs after reboot. In addition, the malware verifies that infected systems do not use English or U.S. system locales before proceeding.

- Advertisement -

McAfee noted that Astaroth uses steganography on GitHub—a technique of hiding data within images—to conceal its configuration files. The company collaborated with Microsoft, which owns GitHub, to remove the repositories and temporarily disrupt the malware’s infrastructure. This approach shows how legitimate platforms can be exploited to enhance malware resilience.

For further reading, see the full McAfee Labs report.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Ripple Rules Out IPO After $500M Round, Keeps Private Still.

Ripple Labs president Monica Long said the company will remain private after a recent...

Nvidia at $187: TipRanks Sees Up to 88.5% Gain in 2026 Today

NVIDIA (NASDAQ: NVDA) opened Wednesday’s trading at about $187 per share.The stock has fallen...

2026 Crypto Rules: Innovation, Sanctions and Analytics Surge

Regulators will pursue rules and sandboxes that prioritize national innovation and competitiveness.Implementation steps on...

Barclays Backs Ubyx to Link Banks via Tokenized Deposits Hub

Barclays invested in Ubyx, a U.S.-based platform for tokenized deposits and regulated stablecoins.Ubyx operates...

Kontigo hacked: 340,905 USDC stolen from 1,005 users -repaid

Kontigo reimbursed users after Hackers drained roughly $341,000 in USDC from more than 1,000...
- Advertisement -

Must Read

9 DePIN Programs For Passive Income

Here’s something most people don’t realize: your smartphone and PC can generate passive income with almost no effort.I’m not talking about clicking ads for...
Bitcoin (BTC) $ 91,493.00 1.51%
Ethereum (ETH) $ 3,165.67 2.65%
XRP (XRP) $ 2.21 3.67%
Bittensor (TAO) $ 271.45 5.18%
Polkadot (DOT) $ 2.15 1.18%
Cardano (ADA) $ 0.403867 1.88%
Chainlink (LINK) $ 13.40 2.82%
Hyperliquid (HYPE) $ 26.80 0.76%
Monero (XMR) $ 440.53 0.56%
Hedera (HBAR) $ 0.123427 3.98%
Toncoin (TON) $ 1.91 1.52%