According to Kaspersky Security Network, between October 2024 and July 2025, over 5,000 users — both individuals and organizations — fell victim to the Efimer trojan. The malware was particularly impactful in Brazil, affecting around 1,500 victims. These attacks also targeted users in India, Spain, Russia, Italy, and Germany.
Kaspersky has discovered a rapidly escalating malicious campaign targeting corporate users with Efimer — a trojan designed to steal and replace cryptocurrency wallet addresses. Initial versions of Efimer appeared in October 2024 and were distributed through compromised WordPress websites. However, in June 2025, the malware began spreading via phishing emails as well. Disguised as a legal firm, the attackers send emails threatening recipients with lawsuits over alleged domain name patent violations to trick them into downloading the malware. This approach allows Efimer to build its own malicious infrastructure and continue spreading to new devices.
An example of the malicious email
“This Trojan is notable for its dual approach, to spreading — targeting both individual users and corporate environments with different tactics. For private users, attackers use torrent files pretending to be popular movies to lure victims, while in corporate settings, they rely on fraudulent emails containing legal threats. Crucially, in both cases, compromise only occurs if the user actively downloads and executes the malicious file,” explains Artyom Ushkov, threat researcher at Kaspersky.
Find the full report on Securelist.com.
Kaspersky recommends corporate and individual users:
· Refrain from downloading torrent files from unknown or untrusted sources.
· Recipients should carefully verify the legitimacy of email senders and ensure antivirus databases are regularly updated.
· Avoid clicking on links or opening attachments in unsolicited or spam emails to reduce the risk of malware infection.
· Stick to best practice including regular software updates, enforcing strong passwords and two-factor authentication, as well as continuous monitoring for signs of compromise.
· Install a trusted security solution and follow its recommendations. Secure solutions will solve the majority of problems automatically and send alerts.
· For developers and website administrators: implementing robust security measures to protect their infrastructure from unauthorized access and malware propagation is essential.