The ‘Maverick’ Trojan uses PowerShell and .NET for a fileless infection strategy, ensuring minimal disk activity. It can gain control over infected devices, capturing banking details while monitoring specific browsers and inserting phishing windows.
This campaign started when victims receive a malicious LNK within a ZIP on WhatsApp and is aimed primarily at Brazilians, confirming location via multiple checks. Once operational, it can control infected machines, implementing keyloggers, taking screenshots, and maintaining persistence through various clever mechanisms. The proactive blocking of 62,000 infection attempts in just ten days underscores the seriousness of this new threat, alongside its connection with the previously documented banking Trojan, Coyote.
👉 Pročitaj original: Kaspersky Securelist