{"id":28724,"date":"2025-04-01T04:55:19","date_gmt":"2025-04-01T08:55:19","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/?p=28724"},"modified":"2025-04-01T14:26:57","modified_gmt":"2025-04-01T08:56:57","slug":"tarot-and-cyber-threats","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/tarot-and-cyber-threats\/28724\/","title":{"rendered":"Tarot and cyberthreats: a new Trojan for fans of the supernatural"},"content":{"rendered":"<p>Imagine what the world would be like if tarot cards could accurately predict any and every event. Perhaps we could have nipped <a href=\"https:\/\/www.kaspersky.com\/blog\/triangulation-37c3-talk\/50166\/\" target=\"_blank\" rel=\"noopener nofollow\">Operation Triangulation<\/a> in the bud, and <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/0days\/\" target=\"_blank\" rel=\"noopener nofollow\">zero-day vulnerabilities<\/a> wouldn\u2019t exist at all, as software developers would receive alerts in advance thanks to tarot readings.<\/p>\n<p>Sounds incredible? Well, our experts actually looked into similar methods in their latest discovery! Read on to learn about the new Trojan we found and how we did it.\n<\/p>\n<h2>The tarot trojan<\/h2>\n<p>\nThe new Trojan \u2014 <strong>Trojan.Arcanum<\/strong> \u2014 is distributed through websites dedicated to fortune-telling and esoteric practices, disguised as a \u201cmagic\u201d app for predicting the future. At first glance, it looks like a harmless program offering users the chance to lay out virtual tarot cards, calculate astrological compatibility, or even \u201ccharge an amulet with the energy of the universe\u201d (whatever that means). But in reality, something truly mystical is unfolding behind the scenes \u2014 in the worst possible way.<\/p>\n<p>Once installed on the user\u2019s device, <strong>Trojan.Arcanum<\/strong> connects to a cloud C2 server and deploys its payload \u2014 the <strong>Autolycus.Hermes<\/strong> stealer, the <strong>Karma.Miner<\/strong> miner, and the <strong>Lysander.Scytale<\/strong> crypto-malware. Having collected user data (logins; passwords; time, date and place of birth; banking information; etc.), the stealer sends it to the cloud. Then the real drama begins: the Trojan starts manipulating its victim in real life using social engineering!<\/p>\n<p>Through pop-up notifications, <strong>Trojan.Arcanum<\/strong> sends pseudo-esoteric advice to the user, prompting them to take certain actions. For example, if the Trojan gains access to the victim\u2019s banking apps and discovers significant funds in the account, the attackers send a command to give the victim a false prediction about the favorability of large investments. After this, the victim might receive a phishing email offering to participate in a \u201cpromising startup\u201d. Or maybe they won\u2019t \u2014 depending on how the cards fall.<\/p>\n<p>In the meantime, the embedded <strong>Karma.Miner<\/strong> begins mining KARMA tokens, and the Trojan activates a paid subscription to dubious \u201cesoteric practices\u201d with monthly charges. If the user detects and terminates the KARMA mining, the crypto-malware randomly shuffles segments of the user\u2019s files without any chance of recovery.\n<\/p>\n<h2>How we discovered Trojan.Arcanum<\/h2>\n<p>\nTypically, we hunt for cyberthreats using complex algorithms and data analysis. But what if the threat is too enigmatic? In such cases, trusting a tarot reading is the best approach. That\u2019s exactly what our experts did. When performing divination on the signature of an unknown virus detected through <a href=\"https:\/\/www.kaspersky.com\/ksn\" target=\"_blank\" rel=\"noopener nofollow\">KSN (Kaspersky Sacral Network)<\/a>, several Major Arcana cards appeared \u2014 some of them reversed:\n<\/p>\n<ol>\n<li>\n<strong>The Emperor<\/strong> \u2014 A symbol of power, control, and strategic foresight. Meaning: the threat is serious.<\/li>\n<li>\n<strong>The Magician<\/strong> \u2014 Able to spot vulnerabilities where no one else does. Clever, proactive, and decisive, the Magician skillfully manipulates people. In reverse, it warns of a loss of control. Meaning: the attackers use social engineering.<\/li>\n<li>\n<strong>The Horse<\/strong> \u2014 Represents a bold, decisive, adventurous individual; a symbol of activity, change\u2026 and Trojan horses. Reversed, the card indicates errors due to impulsive actions. Meaning: the threat might disguise itself as a randomly downloaded harmless app.<\/li>\n<li>\n<strong>The Wheel <\/strong>\u2014 Warns that insurmountable circumstances are beyond the user\u2019s control, and that a favorable resolution will be delayed. Usually indicates a miner or financial scam.<\/li>\n<li>\n<strong>The Tower <\/strong>\u2014 Foretells a phase of change initiated not by the person but by fate \u2014 falling upon the person with relentless force. A strong predictor of a <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-zero-click-exploit\/49637\/\" target=\"_blank\" rel=\"noopener nofollow\">zero-click vulnerability<\/a>.<\/li>\n<li>\n<strong>Death<\/strong> \u2014 represents transformation, a change of cycles, an ending, a transition to a new level. Indicates the presence of crypto-malware.<\/li>\n<\/ol>\n<div id=\"attachment_53260\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2025\/04\/01134815\/tarot-and-cyber-threats-01.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53260\" class=\"size-full wp-image-53260\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2025\/04\/01134815\/tarot-and-cyber-threats-01.jpg\" alt=\"How the reading looked on the expert's table\" width=\"1460\" height=\"960\"><\/a><p id=\"caption-attachment-53260\" class=\"wp-caption-text\">How the reading looked on the expert\u2019s table<\/p><\/div>\n<h2>How to protect yourself from Arcanum<\/h2>\n<p>\nProtecting yourself from such a virus is nearly impossible \u2014 if only because it doesn\u2019t exist. This whole story is a fabrication from start to finish. But what\u2019s stopping it from becoming a reality at any given moment? Trojans and other types of malware do often disguise themselves as <a href=\"https:\/\/www.kaspersky.com\/blog\/ios-android-ocr-stealer-sparkcat\/52980\/\" target=\"_blank\" rel=\"noopener nofollow\">legitimate apps<\/a> and can <a href=\"https:\/\/www.kaspersky.com\/blog\/arcane-stealer-instead-of-cheats-for-minecraft\/53178\/\" target=\"_blank\" rel=\"noopener nofollow\">steal all sorts of data<\/a>. Miners have long been distributed through <a href=\"https:\/\/www.kaspersky.com\/blog\/miner-disguised-as-circumvention-tools\/53118\/\" target=\"_blank\" rel=\"noopener nofollow\">links under popular YouTube videos<\/a> or <a href=\"https:\/\/www.kaspersky.com\/blog\/mario-forever-malware-too\/48547\/\" target=\"_blank\" rel=\"noopener nofollow\">video games<\/a>. Ransomware is capable of <a href=\"https:\/\/www.kaspersky.com\/blog\/ransowmare-attacks-in-2024\/52949\/\" target=\"_blank\" rel=\"noopener nofollow\">paralyzing an entire nation\u2019s healthcare insurance system<\/a>. Moreover, magic themes are certainly popular enough to become a potential target of cybercriminals. Here are some tips to make your digital life safer:\n<\/p>\n<ul>\n<li>\n<a href=\"https:\/\/www.kaspersky.com\/top3\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Trust proven security tech<\/strong><\/a><strong>. <\/strong>A tarot reading won\u2019t detect a virus or save your smartphone or laptop from one, but <a href=\"https:\/\/www.kaspersky.co.in\/premium?icid=in_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a><strong>\u00a0<\/strong>will.<\/li>\n<li>\n<a href=\"https:\/\/www.kaspersky.com\/blog\/android-most-dangerous-features\/49418\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Check app permissions<\/strong><\/a><strong>.<\/strong> If a fortune-telling app requests access to your text messages, geolocation, or the file system, think twice \u2014 why does it need that? You\u2019re likely looking at <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/tracking\/\" target=\"_blank\" rel=\"noopener nofollow\">disguised spyware<\/a>, not some magical technology.<\/li>\n<li>\n<a href=\"https:\/\/www.kaspersky.com\/blog\/subscrab-custom-subscription-manager\/52516\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Pay close attention to your subscriptions<\/strong><\/a><strong>.<\/strong> Regularly check the subscriptions in your app store settings so you don\u2019t suddenly find out you\u2019ve been forking out some <em>Secret Order of Fortune Tellers<\/em> every month.<\/li>\n<li>\n<a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/april-1\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Don\u2019t believe everything you read online<\/strong><\/a><strong>. <\/strong>Especially on April 1.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>New malware targets magic enthusiasts \u2014 sending stolen data to an &#8220;astral cloud server&#8221;.<\/p>\n","protected":false},"author":2706,"featured_media":28727,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1855,2195],"tags":[2002,2047,2136,443,2812,527,698],"class_list":{"0":"post-28724","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-special-projects","9":"tag-april-1","10":"tag-cryptomalware","11":"tag-miners","12":"tag-ransomware","13":"tag-stealers","14":"tag-threats","15":"tag-trojans"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/tarot-and-cyber-threats\/28724\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/tarot-and-cyber-threats\/23963\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/tarot-and-cyber-threats\/28841\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/tarot-and-cyber-threats\/29555\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/tarot-and-cyber-threats\/53256\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/tarot-and-cyber-threats\/22683\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/tarot-and-cyber-threats\/23544\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/tarot-and-cyber-threats\/32040\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/tarot-and-cyber-threats\/34788\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/tarot-and-cyber-threats\/34421\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/threats\/","name":"threats"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/28724","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=28724"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/28724\/revisions"}],"predecessor-version":[{"id":28729,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/28724\/revisions\/28729"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/28727"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=28724"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=28724"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=28724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}