Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Malware

S0447

Lokibot

Type

Infostealer Trojan

Associated threat actors

SilverTerrier

Key Capabilities

Collects sensitive credentials, financial data, and personal information using keylogging, clipboard monitoring, and data exfiltration.

OS Targeted

Windows and Android

IoCs on Maltiverse

Maltiverse provides updated IoCs for easy SIEM/SOAR/Firewall/EDR integration.

What is Lokibot?

Lokibot (S0447) is an information-stealing Trojan designed for credential theft. It harvests sensitive financial and personal information from Windows and Android devices. Often spread via phishing, this trojan uses a keylogger, clipboard monitoring, and other data exfiltration features.

Lokibot’s modular architecture, where malware has a core component that can be updated with different plugins or modules, allows threat actors like SilverTerrier to constantly update its capabilities. This contributes to it being classified as a persistent threat.

How to Defend Against Lokibot?

Defending against Lokibot requires preventing its initial infection and detecting its data exfiltration.

  • Be cautious with email attachments and downloads, which are the primary delivery vectors for this infostealer.
  • Keep all operating systems and applications patched to limit the vulnerabilities that can be exploited for initial access.
  • Leverage threat intelligence from platforms like Lumu Maltiverse to aggregate IoCs, analyze behavior, and improve incident response.
  • Use continuous compromise assessment with integrated threat intelligence to spot and block the exfiltration of stolen data to C2 servers.
  • Implement network segmentation to mitigate lateral movement in case of a breach.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.