January 30, 2025
By Cybervergent Team

SolarSys Trojan

There’s a new wild kid on the threat block, called SolarSys. It is a sophisticated Trojan targeting banking customers with a multi-pronged approach to data theft. With a modular setup that includes JavaScript backdoors, mail worms, and stealthy spying tools, SolarSys is tough to detect—and tougher to stop.

How SolarSys Works

  • Multi-Component Setup: SolarSys is built with specialized modules: JavaScript backdoors, email worms, and     spying tools, each crafted to bypass security defenses and steal valuable     data.
  • Domain Generation Algorithm (DGA): This feature rapidly creates new domains to evade detection, ensuring the     Trojan can stay live even when security vendors attempt to block it.
  • Infection via Fake Installers: The Trojan disguises itself as legitimate applications (like Java) using fake     MSI installers, which run malicious code to establish a backdoor for     regular updates and persistent access.

Auto-Spreading via Phishing

SolarSys uses a Node.js environment to send phishing emails from the infected user’s account, reaching out to contacts with malware-laden attachments. These phishing emails keep the malware spreading in a “self-propagating” cycle.

Targeting Personal Data and Banking Info

The Trojan’s spy components can capture:

  • Google Chrome credentials, browsing history, and more.
  • Banking details by overlaying a fake login screen on major bank     sites.

How To Protect Yourself

Be cautious with installers—stick to official sources for software downloads.

Activate multi-layered security to detect unusual network activity.

Monitor email activity for unexpected messages sent to your contacts.

Use two-factor authentication (2FA) to add another layer of security for bank accounts.

Stay vigilant, and avoid downloads from unknown sources!!!