Coyote Trojan Unleashes UI Automation Chaos: Brazilian Banks Under Siege!
The Coyote banking trojan is up to new tricks! This sneaky malware is now using Microsoft’s UI Automation framework to swipe banking credentials, and it’s targeting Brazilian users. It’s like a magician using UIA to make your sensitive info disappear—just not into a hat, but a hacker’s database!

Hot Take:
Looks like Coyote’s gone from chasing roadrunners to chasing bank accounts! This trojan’s got a new trick up its sleeve, using Microsoft’s UI Automation like a sneaky raccoon in a trash can. Who knew assistive technologies could be so… assisting for cyber crooks?
Key Points:
- Coyote banking trojan uses Microsoft’s UI Automation for the first time to extract banking credentials.
- Targets Brazilian users, focusing on banks and cryptocurrency platforms.
- The malware is harder to detect due to its innovative use of UI Automation instead of traditional APIs.
- Includes a hardcoded list of 75 financial institutions and crypto exchanges.
- Akamai suggests monitoring UIAutomationCore.dll and using osquery for early detection of threats.
Already a member? Log in here