Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

From Brazil with Love: New Tactics from Lampion

0
Medium
Published: Fri Oct 31 2025 (10/31/2025, 09:33:16 UTC)
Source: AlienVault OTX General

Description

The Lampion banking trojan campaign, active since at least 2019, is a sophisticated spam operation originating from Brazil that targets users primarily through malicious email attachments and ClickFix-themed lures. The infection chain uses multiple stages of obfuscated Visual Basic scripts to deploy an updated Lampion Stealer malware. The threat actors employ advanced evasion tactics such as IP blacklisting and large file sizes to hinder analysis, and they leverage multiple cloud providers for distributed, ephemeral infrastructure. The campaign targets domains mimicking Portuguese tax authorities and finance portals, indicating a focus on Portuguese-speaking European countries. Although no CVSS score is assigned, the threat poses a medium severity risk due to its potential to steal sensitive banking credentials and personal data, combined with its persistence and stealth. European organizations, especially in Portugal, are at heightened risk given the targeted domain names and lures. Defenders should focus on enhanced email filtering, user awareness training about attachments, domain monitoring, and endpoint detection of obfuscated script execution to mitigate this threat.

AI-Powered Analysis

AILast updated: 10/31/2025, 11:24:35 UTC

Technical Analysis

The Lampion banking trojan campaign is a long-running and evolving malware operation attributed to a Brazilian threat actor group. Since at least 2019, the group has shifted tactics from using malicious links to deploying email attachments containing obfuscated Visual Basic scripts. These scripts execute in multiple stages to evade detection and ultimately install the Lampion Stealer, a banking trojan designed to harvest financial credentials and sensitive information. The campaign uses ClickFix-themed lures, a known social engineering tactic, to entice victims to open malicious attachments. The attackers employ sophisticated evasion techniques including IP blacklisting to avoid security researchers and analysts, and the use of large file sizes to complicate automated analysis. The malicious infrastructure is distributed across multiple cloud service providers, allowing for rapid changes in some components while maintaining stable core elements, which supports the campaign's persistence and stealth. The domains used in the campaign are crafted to impersonate Portuguese tax and finance authorities, such as 'autoridade-tributaria-pt.com' and 'portal-das-financas-pt.org', indicating a strategic targeting of Portuguese-speaking users in Europe. The campaign does not currently have known exploits in the wild beyond the spam and attachment infection vector, but its multi-stage infection chain and obfuscation make it a challenging threat to detect and remediate. The campaign's tactics align with MITRE ATT&CK techniques such as T1566 (Phishing), T1059.005 (Visual Basic), T1078 (Valid Accounts), and T1547.001 (Registry Run Keys/Startup Folder), among others, highlighting its complexity and sophistication.

Potential Impact

For European organizations, particularly those in Portugal, the Lampion campaign poses a significant threat to the confidentiality and integrity of financial and personal data. Successful infections can lead to credential theft, unauthorized access to banking accounts, and potential financial fraud. The use of domains mimicking official tax authorities increases the likelihood of user deception and infection. The campaign's persistence and use of cloud infrastructure complicate takedown efforts and incident response. Organizations may face reputational damage, financial losses, and regulatory penalties if sensitive customer or employee data is compromised. The medium severity rating reflects the targeted nature of the attack and the potential for significant impact on affected individuals and institutions. Additionally, the campaign's evasion techniques may allow it to bypass traditional security controls, increasing the risk of undetected compromise.

Mitigation Recommendations

To mitigate the Lampion banking trojan threat, European organizations should implement multi-layered defenses focused on email security and endpoint protection. Specifically, deploy advanced email filtering solutions capable of detecting and quarantining malicious attachments, especially those containing obfuscated scripts. Conduct targeted user awareness training emphasizing the risks of opening unexpected attachments and recognizing phishing lures themed around tax authorities or finance portals. Monitor and block access to known malicious domains identified in the campaign, such as those impersonating Portuguese tax services. Employ endpoint detection and response (EDR) tools to identify suspicious script execution and anomalous registry or startup modifications indicative of malware persistence. Regularly update and patch systems to reduce the attack surface, even though this campaign does not exploit known software vulnerabilities. Implement network segmentation and restrict outbound traffic to limit malware command and control communications. Finally, establish incident response plans that include rapid identification and containment of infections, and collaborate with local cybersecurity authorities to share threat intelligence.

Affected Countries

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.bitsight.com/blog/brazil-love-new-tactics-lampion"]
Adversary
Lampion
Pulse Id
6904825c8b7788f09d0d5ce2
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainindebt-faturas.com
domainat-portal-das-financas.com
domainat-portaldasfinancas-pt.com
domainat-portaldasfinancas-pt.org
domainat-portaldasfinancas.com
domainat-portaldasfinancas.org
domainatportal-das-financas.com
domainautoridade-tributaria-gov.com
domainautoridade-tributaria-pt.com
domainautoridade-tributaria-pt.org
domainautoridade-tributaria.com
domainautoridade-tributaria.org
domainautoridadetributaria-pt.org
domainautoridadetributaria.org
domainfat-doc-online.com
domainindebt-faturas.com
domainportal-das-financas-pt.com
domainportal-das-financas-pt.org
domainportaldasfinancas-at.com
domainportaldasfinancas-pt.org
domainportaldasfinancas.org

Threat ID: 69049c46479ed964d8e04a40

Added to database: 10/31/2025, 11:23:50 AM

Last enriched: 10/31/2025, 11:24:35 AM

Last updated: 10/31/2025, 6:26:09 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats