A newly discovered malware, dubbed Trojan.Arcanum, is targeting enthusiasts of tarot, astrology, and other esoteric practices.
This sophisticated trojan masquerades as a harmless “magic” application designed for fortune-telling, astrological compatibility checks, and even mystical rituals like “charging an amulet with universal energy.”
However, beneath its seemingly innocuous interface lies a malicious payload aimed at stealing sensitive user data and manipulating victims through social engineering.
Multifaceted Threat: Data Theft, Crypto Mining, and File Tampering
Upon installation, Trojan.Arcanum connects to a cloud-based command-and-control (C2) server to deploy multiple malicious components.
These include the Autolycus.Hermes stealer for harvesting login credentials and banking information, the Karma.Miner cryptocurrency miner for generating KARMA tokens, and the Lysander.Scytale crypto-malware that can irreversibly corrupt user files.

The malware employs advanced social engineering tactics to manipulate victims.
For instance, if it detects significant funds in a victim’s banking app, it sends tailored pop-up notifications with pseudo-esoteric advice encouraging risky financial decisions.
Victims may then receive phishing emails promoting fraudulent investment opportunities under the guise of favorable astrological predictions.
Additionally, Karma.Miner covertly mines cryptocurrency while the trojan activates paid subscriptions to dubious esoteric services.
If users attempt to disable the mining process, the malware retaliates by randomly corrupting segments of their files ensuring no chance of recovery.
The discovery of Trojan.Arcanum involved unconventional methods by cybersecurity experts at Kaspersky Lab.
While traditional detection relies on algorithms and data analysis, researchers humorously conducted a tarot reading on the malware’s digital signature using Kaspersky Sacral Network (KSN).
The reading revealed reversed Major Arcana cards symbolizing power manipulation (The Emperor), social engineering (The Magician), hidden threats (The Horse), financial scams (The Wheel), and ransomware-like devastation (The Tower).
Although the tarot reading was facetious in nature highlighting April Fool’s Day it underscored the creative ways cybercriminals could exploit popular themes like mysticism.
A Fictional Warning with Real Implications
While Trojan.Arcanum itself is fictional an April Fool’s prank by Kaspersky the underlying risks it highlights are very real.
Malware often disguises itself as legitimate applications to steal data or deploy harmful payloads.
Themes like magic and fortune-telling are particularly vulnerable due to their popularity among niche communities.
To safeguard against similar threats, users should adopt robust cybersecurity practices:
- Use trusted security solutions: Premium antivirus software can detect and neutralize disguised malware effectively.
- Scrutinize app permissions: Be cautious if apps request access to sensitive data like text messages or geolocation without justification.
- Monitor subscriptions: Regularly check app store settings for unauthorized subscriptions tied to fraudulent services.
- Verify online claims: Avoid falling prey to sensational promises or predictions, especially from unverified sources.
Though Trojan.Arcanum was a playful fabrication, its concept serves as a cautionary tale about how cybercriminals could exploit thematic vulnerabilities in unsuspecting communities.
Find this Story Interesting! Follow us on LinkedIn, and X to Get More Instant Updates