spot_img

Date:

Share:

Kaspersky uncovers Efimer trojan targeting organisations through phishing emails

According to Kaspersky Security Network, between October 2024 and July 2025, over 5,000 users — both individuals and organisations — fell victim to the Efimer trojan. The malware was particularly impactful in Brazil, affecting around 1,500 victims. These attacks also targeted users in India, Spain, Russia, Italy, and Germany.

Kaspersky has discovered a rapidly escalating malicious campaign targeting corporate users with Efimer — a trojan designed to steal and replace cryptocurrency wallet addresses. Initial versions of Efimer appeared in October 2024 and were distributed through compromised WordPress websites. However, in June 2025, the malware began spreading via phishing emails as well. Disguised as a legal firm, the attackers send emails threatening recipients with lawsuits over alleged domain name patent violations to trick them into downloading the malware. This approach allows Efimer to build its own malicious infrastructure and continue spreading to new devices.

“This Trojan is notable for its dual approach, to spreading — targeting both individual users and corporate environments with different tactics. For private users, attackers use torrent files pretending to be popular movies to lure victims, while in corporate settings, they rely on fraudulent emails containing legal threats. Crucially, in both cases, compromise only occurs if the user actively downloads and executes the malicious file,” explains Artyom Ushkov, threat researcher at Kaspersky.

Kaspersky recommends corporate and individual users:

  • Refrain from downloading torrent files from unknown or untrusted sources.
  • Recipients should carefully verify the legitimacy of email senders and ensure antivirus databases are regularly updated.
  • Avoid clicking on links or opening attachments in unsolicited or spam emails to reduce the risk of malware infection.
  • Stick to best practice including regular software updates, enforcing strong passwords and two-factor authentication, as well as continuous monitoring for signs of compromise.
  • Install a trusted security solution and follow its recommendations. Secure solutions will solve the majority of problems automatically and send alerts.
  • For developers and website administrators: implementing robust security measures to protect their infrastructure from unauthorised access and malware propagation is essential.

Find the full report on Securelist.com.

spot_img
spot_img

━ More like this

You Have Been Storm’ed

Everyone at some point clicks something they should not have. An email link without thinking. Or, in a rush, you click a web or...

Kaspersky MDR introduces major updates, strengthening detection and investigation capabilities

Kaspersky Managed Detection and Response now offers enhanced automation and incident management features, introduces a new offering for industrial and embedded systems, and delivers...

AI Has Turned Biometric Security Into a Fraud Target, New Data Shows

New data shows nearly 9 in 10 failed identity checks in Southern Africa are linked to AI-driven impersonation.  The systems designed to verify identity and...

Online scam exposure remains widespread despite high levels of self-assurance, Kaspersky reports

A recent Kaspersky survey highlights a considerable gap between consumers’ confidence in identifying online scams and their actual exposure to cyber threats. According to...

Identity under siege: The new order of security in 2026

The threat model has changed as artificial intelligence lowers the barrier to entry for cybercrime. Attack velocity and threat veracity have increased exponentially. Impersonation...
spot_img