From Brazil with Love: New Tactics from Lampion
The Lampion banking trojan campaign, active since at least 2019, is a sophisticated spam operation originating from Brazil that targets users primarily through malicious email attachments and ClickFix-themed lures. The infection chain uses multiple stages of obfuscated Visual Basic scripts to deploy an updated Lampion Stealer malware. The threat actors employ advanced evasion tactics such as IP blacklisting and large file sizes to hinder analysis, and they leverage multiple cloud providers for distributed, ephemeral infrastructure. The campaign targets domains mimicking Portuguese tax authorities and finance portals, indicating a focus on Portuguese-speaking European countries. Although no CVSS score is assigned, the threat poses a medium severity risk due to its potential to steal sensitive banking credentials and personal data, combined with its persistence and stealth. European organizations, especially in Portugal, are at heightened risk given the targeted domain names and lures. Defenders should focus on enhanced email filtering, user awareness training about attachments, domain monitoring, and endpoint detection of obfuscated script execution to mitigate this threat.
AI Analysis
Technical Summary
The Lampion banking trojan campaign is a long-running and evolving malware operation attributed to a Brazilian threat actor group. Since at least 2019, the group has shifted tactics from using malicious links to deploying email attachments containing obfuscated Visual Basic scripts. These scripts execute in multiple stages to evade detection and ultimately install the Lampion Stealer, a banking trojan designed to harvest financial credentials and sensitive information. The campaign uses ClickFix-themed lures, a known social engineering tactic, to entice victims to open malicious attachments. The attackers employ sophisticated evasion techniques including IP blacklisting to avoid security researchers and analysts, and the use of large file sizes to complicate automated analysis. The malicious infrastructure is distributed across multiple cloud service providers, allowing for rapid changes in some components while maintaining stable core elements, which supports the campaign's persistence and stealth. The domains used in the campaign are crafted to impersonate Portuguese tax and finance authorities, such as 'autoridade-tributaria-pt.com' and 'portal-das-financas-pt.org', indicating a strategic targeting of Portuguese-speaking users in Europe. The campaign does not currently have known exploits in the wild beyond the spam and attachment infection vector, but its multi-stage infection chain and obfuscation make it a challenging threat to detect and remediate. The campaign's tactics align with MITRE ATT&CK techniques such as T1566 (Phishing), T1059.005 (Visual Basic), T1078 (Valid Accounts), and T1547.001 (Registry Run Keys/Startup Folder), among others, highlighting its complexity and sophistication.
Potential Impact
For European organizations, particularly those in Portugal, the Lampion campaign poses a significant threat to the confidentiality and integrity of financial and personal data. Successful infections can lead to credential theft, unauthorized access to banking accounts, and potential financial fraud. The use of domains mimicking official tax authorities increases the likelihood of user deception and infection. The campaign's persistence and use of cloud infrastructure complicate takedown efforts and incident response. Organizations may face reputational damage, financial losses, and regulatory penalties if sensitive customer or employee data is compromised. The medium severity rating reflects the targeted nature of the attack and the potential for significant impact on affected individuals and institutions. Additionally, the campaign's evasion techniques may allow it to bypass traditional security controls, increasing the risk of undetected compromise.
Mitigation Recommendations
To mitigate the Lampion banking trojan threat, European organizations should implement multi-layered defenses focused on email security and endpoint protection. Specifically, deploy advanced email filtering solutions capable of detecting and quarantining malicious attachments, especially those containing obfuscated scripts. Conduct targeted user awareness training emphasizing the risks of opening unexpected attachments and recognizing phishing lures themed around tax authorities or finance portals. Monitor and block access to known malicious domains identified in the campaign, such as those impersonating Portuguese tax services. Employ endpoint detection and response (EDR) tools to identify suspicious script execution and anomalous registry or startup modifications indicative of malware persistence. Regularly update and patch systems to reduce the attack surface, even though this campaign does not exploit known software vulnerabilities. Implement network segmentation and restrict outbound traffic to limit malware command and control communications. Finally, establish incident response plans that include rapid identification and containment of infections, and collaborate with local cybersecurity authorities to share threat intelligence.
Affected Countries
Portugal
Indicators of Compromise
- domain: indebt-faturas.com
- domain: at-portal-das-financas.com
- domain: at-portaldasfinancas-pt.com
- domain: at-portaldasfinancas-pt.org
- domain: at-portaldasfinancas.com
- domain: at-portaldasfinancas.org
- domain: atportal-das-financas.com
- domain: autoridade-tributaria-gov.com
- domain: autoridade-tributaria-pt.com
- domain: autoridade-tributaria-pt.org
- domain: autoridade-tributaria.com
- domain: autoridade-tributaria.org
- domain: autoridadetributaria-pt.org
- domain: autoridadetributaria.org
- domain: fat-doc-online.com
- domain: indebt-faturas.com
- domain: portal-das-financas-pt.com
- domain: portal-das-financas-pt.org
- domain: portaldasfinancas-at.com
- domain: portaldasfinancas-pt.org
- domain: portaldasfinancas.org
From Brazil with Love: New Tactics from Lampion
Description
The Lampion banking trojan campaign, active since at least 2019, is a sophisticated spam operation originating from Brazil that targets users primarily through malicious email attachments and ClickFix-themed lures. The infection chain uses multiple stages of obfuscated Visual Basic scripts to deploy an updated Lampion Stealer malware. The threat actors employ advanced evasion tactics such as IP blacklisting and large file sizes to hinder analysis, and they leverage multiple cloud providers for distributed, ephemeral infrastructure. The campaign targets domains mimicking Portuguese tax authorities and finance portals, indicating a focus on Portuguese-speaking European countries. Although no CVSS score is assigned, the threat poses a medium severity risk due to its potential to steal sensitive banking credentials and personal data, combined with its persistence and stealth. European organizations, especially in Portugal, are at heightened risk given the targeted domain names and lures. Defenders should focus on enhanced email filtering, user awareness training about attachments, domain monitoring, and endpoint detection of obfuscated script execution to mitigate this threat.
AI-Powered Analysis
Technical Analysis
The Lampion banking trojan campaign is a long-running and evolving malware operation attributed to a Brazilian threat actor group. Since at least 2019, the group has shifted tactics from using malicious links to deploying email attachments containing obfuscated Visual Basic scripts. These scripts execute in multiple stages to evade detection and ultimately install the Lampion Stealer, a banking trojan designed to harvest financial credentials and sensitive information. The campaign uses ClickFix-themed lures, a known social engineering tactic, to entice victims to open malicious attachments. The attackers employ sophisticated evasion techniques including IP blacklisting to avoid security researchers and analysts, and the use of large file sizes to complicate automated analysis. The malicious infrastructure is distributed across multiple cloud service providers, allowing for rapid changes in some components while maintaining stable core elements, which supports the campaign's persistence and stealth. The domains used in the campaign are crafted to impersonate Portuguese tax and finance authorities, such as 'autoridade-tributaria-pt.com' and 'portal-das-financas-pt.org', indicating a strategic targeting of Portuguese-speaking users in Europe. The campaign does not currently have known exploits in the wild beyond the spam and attachment infection vector, but its multi-stage infection chain and obfuscation make it a challenging threat to detect and remediate. The campaign's tactics align with MITRE ATT&CK techniques such as T1566 (Phishing), T1059.005 (Visual Basic), T1078 (Valid Accounts), and T1547.001 (Registry Run Keys/Startup Folder), among others, highlighting its complexity and sophistication.
Potential Impact
For European organizations, particularly those in Portugal, the Lampion campaign poses a significant threat to the confidentiality and integrity of financial and personal data. Successful infections can lead to credential theft, unauthorized access to banking accounts, and potential financial fraud. The use of domains mimicking official tax authorities increases the likelihood of user deception and infection. The campaign's persistence and use of cloud infrastructure complicate takedown efforts and incident response. Organizations may face reputational damage, financial losses, and regulatory penalties if sensitive customer or employee data is compromised. The medium severity rating reflects the targeted nature of the attack and the potential for significant impact on affected individuals and institutions. Additionally, the campaign's evasion techniques may allow it to bypass traditional security controls, increasing the risk of undetected compromise.
Mitigation Recommendations
To mitigate the Lampion banking trojan threat, European organizations should implement multi-layered defenses focused on email security and endpoint protection. Specifically, deploy advanced email filtering solutions capable of detecting and quarantining malicious attachments, especially those containing obfuscated scripts. Conduct targeted user awareness training emphasizing the risks of opening unexpected attachments and recognizing phishing lures themed around tax authorities or finance portals. Monitor and block access to known malicious domains identified in the campaign, such as those impersonating Portuguese tax services. Employ endpoint detection and response (EDR) tools to identify suspicious script execution and anomalous registry or startup modifications indicative of malware persistence. Regularly update and patch systems to reduce the attack surface, even though this campaign does not exploit known software vulnerabilities. Implement network segmentation and restrict outbound traffic to limit malware command and control communications. Finally, establish incident response plans that include rapid identification and containment of infections, and collaborate with local cybersecurity authorities to share threat intelligence.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.bitsight.com/blog/brazil-love-new-tactics-lampion"]
- Adversary
- Lampion
- Pulse Id
- 6904825c8b7788f09d0d5ce2
- Threat Score
- null
Indicators of Compromise
Domain
| Value | Description | Copy | 
|---|---|---|
| domainindebt-faturas.com | — | |
| domainat-portal-das-financas.com | — | |
| domainat-portaldasfinancas-pt.com | — | |
| domainat-portaldasfinancas-pt.org | — | |
| domainat-portaldasfinancas.com | — | |
| domainat-portaldasfinancas.org | — | |
| domainatportal-das-financas.com | — | |
| domainautoridade-tributaria-gov.com | — | |
| domainautoridade-tributaria-pt.com | — | |
| domainautoridade-tributaria-pt.org | — | |
| domainautoridade-tributaria.com | — | |
| domainautoridade-tributaria.org | — | |
| domainautoridadetributaria-pt.org | — | |
| domainautoridadetributaria.org | — | |
| domainfat-doc-online.com | — | |
| domainindebt-faturas.com | — | |
| domainportal-das-financas-pt.com | — | |
| domainportal-das-financas-pt.org | — | |
| domainportaldasfinancas-at.com | — | |
| domainportaldasfinancas-pt.org | — | |
| domainportaldasfinancas.org | — | 
Threat ID: 69049c46479ed964d8e04a40
Added to database: 10/31/2025, 11:23:50 AM
Last enriched: 10/31/2025, 11:24:35 AM
Last updated: 10/31/2025, 6:26:09 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
In Other News: WhatsApp Passkey-Encrypted Backups, Russia Targets Meduza Malware, New Mastercard Solution
MediumUkrainian Conti Ransomware Suspect Extradited to US from Ireland
MediumNew wave of cyberattacks by APT group Cloud Atlas on Russia's government sector
MediumNew Loader Executing TorNet and PureHVNC
MediumLATAM baited into the delivery of PureHVNC
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.