Sunday, April 13, 2025
Homecyber securityNew Malware Targets Magic Enthusiasts to Steal Logins

New Malware Targets Magic Enthusiasts to Steal Logins

Published on

SIEM as a Service

Follow Us on Google News

A newly discovered malware, dubbed Trojan.Arcanum, is targeting enthusiasts of tarot, astrology, and other esoteric practices.

Disguised as a legitimate fortune-telling application, this Trojan infiltrates devices to steal sensitive data, manipulate users through social engineering, and even deploy cryptocurrency mining software.

The malware is distributed via websites dedicated to mystical practices, masquerading as a harmless app that offers virtual tarot readings, astrological compatibility checks, and other “magical” features.

- Advertisement - Google News

Once installed, however, the app connects to a command-and-control (C2) server referred to as the “astral cloud” and activates its payload.

This includes several malicious components:

  • Autolycus.Hermes: A stealer that exfiltrates login credentials, banking details, and personal information.
  • Karma.Miner: A cryptocurrency miner that generates KARMA tokens using the victim’s device resources.
  • Lysander.Scytale: Crypto-malware capable of corrupting user files if mining activities are disrupted.
How the reading looked on the expert’s table

Social Engineering Meets Cybercrime

What sets Trojan.Arcanum apart is its use of pseudo-esoteric advice to manipulate victims.

After analyzing the victim’s financial data, the malware sends tailored messages through pop-up notifications.

For instance, if significant funds are detected in a banking app, the malware may prompt the user with a fake prediction encouraging large investments.

This could lead victims to fall for phishing scams disguised as promising business opportunities.

Additionally, Trojan.Arcanum subscribes users to dubious paid services under the guise of esoteric practices, incurring recurring charges.

If users attempt to terminate mining operations or subscriptions, the crypto-malware component wreaks havoc by irreversibly shuffling segments of their files.

A Fabricated Threat or a Warning?

Interestingly, this malware narrative was revealed on April 1st as part of an elaborate fictional scenario created by cybersecurity experts at Kaspersky Lab.

While Trojan.Arcanum itself does not exist, it highlights the potential risks posed by malicious apps leveraging niche interests like magic and fortune-telling to deceive users.

The scenario underscores how cybercriminals could exploit popular themes to distribute Trojans and other malware.

Though Trojan.Arcanum is fictional, the tactics described are grounded in real-world cyber threats.

To safeguard against similar attacks:

  • Use trusted security software to detect and block malware before it compromises your device.
  • Scrutinize app permissions; avoid granting unnecessary access to sensitive data or system functions.
  • Regularly review subscriptions linked to your accounts to identify unauthorized charges promptly.
  • Exercise skepticism toward online claims and avoid downloading apps from unverified sources.

As cybercriminals continue to innovate their methods, even seemingly harmless interests like magic can become vectors for sophisticated attacks.

Staying vigilant and employing robust cybersecurity measures remain critical defenses against such evolving threats.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...