Coyote Trojan Unleashes UI Automation Chaos: Brazilian Banks Under Siege!

The Coyote banking trojan is up to new tricks! This sneaky malware is now using Microsoft’s UI Automation framework to swipe banking credentials, and it’s targeting Brazilian users. It’s like a magician using UIA to make your sensitive info disappear—just not into a hat, but a hacker’s database!

Pro Dashboard

Hot Take:

Looks like Coyote’s gone from chasing roadrunners to chasing bank accounts! This trojan’s got a new trick up its sleeve, using Microsoft’s UI Automation like a sneaky raccoon in a trash can. Who knew assistive technologies could be so… assisting for cyber crooks?

Key Points:

  • Coyote banking trojan uses Microsoft’s UI Automation for the first time to extract banking credentials.
  • Targets Brazilian users, focusing on banks and cryptocurrency platforms.
  • The malware is harder to detect due to its innovative use of UI Automation instead of traditional APIs.
  • Includes a hardcoded list of 75 financial institutions and crypto exchanges.
  • Akamai suggests monitoring UIAutomationCore.dll and using osquery for early detection of threats.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?