Banking Trojan Stays Active After Takedowns

Astaroth Trojan Uses GitHub to Evade Disruption

Cybersecurity researchers have discovered a new campaign delivering the Astaroth banking trojan, which cleverly remains operational even after takedowns. The malware uses GitHub as a backup control system to keep running when its main servers are blocked. Therefore, removing its infrastructure does not immediately stop the infection chain.

How the Campaign Starts

The attack begins with a phishing email that imitates a legitimate DocuSign message. The email includes a link to a zipped Windows shortcut (.lnk) file. When victims open the file, hidden JavaScript runs silently in the background. This script then downloads more malicious code from remote servers to continue the infection.

Inside the Attack Chain

The JavaScript loads an AutoIt script, which executes shellcode that decrypts a Delphi-based DLL. This DLL injects the Astaroth malware into a Windows process to hide its presence. As a result, the trojan installs itself deeply and avoids easy detection. However, every step of this chain depends on users opening the initial phishing file.

What the Trojan Steals

Astaroth targets banking and cryptocurrency users. It checks the active browser window every second to detect visits to financial websites. When detected, it records keystrokes to steal login credentials and transactions. The stolen data is then sent to the attackers through a reverse proxy connection. Therefore, even encrypted traffic may not prevent exfiltration.

GitHub as a Survival Tool

Instead of relying only on command-and-control servers, the trojan retrieves new configurations from GitHub repositories. Researchers found it hides settings inside image files using steganography. When one server is taken down, Astaroth simply pulls a new configuration from GitHub and continues running. This approach makes the malware highly resilient against takedowns.

Regional Focus and Behavior

The campaign mainly targets Brazil and several Latin American countries. However, the infection files are geo-fenced, so they stop executing if the system locale is English or U.S. based. Moreover, the malware checks for analysis tools like debuggers and network monitors. Therefore, it avoids running in virtual environments or research labs.

Ongoing Response

Researchers collaborated with the hosting provider to remove the malicious repositories. Yet, the operation was only temporarily neutralized. Because attackers can quickly create new repositories, the campaign may reappear with minimal effort. Consequently, experts urge organizations to strengthen internal defenses rather than relying solely on takedowns.

How to Prevent Similar Attacks

Organizations should implement advanced email filtering and employee phishing training. In addition, they must enforce strict attachment policies and system patching. Continuous endpoint monitoring and real-time behavioral analysis can detect abnormal scripts early. Security assessments, app hardening, and managed detection services also help block malware that abuses legitimate platforms like GitHub.

Sleep well, we got you covered.

Scroll to Top