Coyote Banking Trojan: How UI Automation Became the Unlikely Sidekick in Credential Heists

Coyote’s banking trojan is breaking bad and has become the first reported malware to exploit Microsoft’s UI Automation for credential theft. Targeting Brazilians, it’s already pilfered credentials from users at 75 banks and crypto exchanges. Because why let a good accessibility feature go to waste when you could steal money instead?

Pro Dashboard

Hot Take:

Who knew that the Coyote had a tech-savvy side? Move over, Wile E. Coyote — there’s a new brainiac in town, and it’s not chasing roadrunners, but your bank details! Apparently, even the most well-intentioned Microsoft accessibility features can be twisted into a digital smash-and-grab. It’s a good time to double-check your passwords, folks. Coyote is on the prowl, and it’s not going to stop at Acme products!

Key Points:

  • Coyote banking trojan uses Microsoft’s UI Automation for credential theft, targeting Brazilians.
  • UIA is designed for accessibility, but has become a tool for cybercriminals to nab credentials.
  • The malware identifies potential targets by comparing active window titles with target bank URLs.
  • First malware variant to exploit the UI Automation framework for malicious purposes.
  • Coyote also utilizes the Squirrel tool to disguise itself as a legitimate Windows app update.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?