TajMahal is a technically sophisticated Advanced Persistent Threat (APT) framework, a type of malware that has been developed and used for at least five years. It was first identified by Kaspersky Lab in the autumn of 2018, but evidence shows that its presence dates back to at least August 2014, as confirmed by samples found on a victim's machine. The TajMahal malware, known for its complexity and stealth, can infiltrate systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or hold data hostage for ransom.
This APT framework is unique in that it consists of two different types of packages, self-named Tokyo and Yokohama. These packages add to the complexity and potential damage caused by the TajMahal malware, indicating a high level of technical sophistication from the perpetrators. The exact functionalities and impacts of these packages are part of ongoing investigations and more details about them are available to customers of the Kaspersky Intelligence Reporting service.
Kaspersky Lab products detect the TajMahal APT samples as HEUR:Trojan.Multi.Chaperone.gen. This detection suggests that the TajMahal malware exhibits multiple malicious behaviors, making it a significant threat to any system it infects. As with all malware, users are advised to maintain up-to-date security software, avoid suspicious downloads, emails, and websites, and regularly back up their data to mitigate potential damage.
Description last updated: 2024-01-06T17:00:01.463Z