Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Rust-based VENON malware targets 33 Brazilian banks with credential-stealing overlay

Hive0163 uses AI-assisted Slopoly malware for persistent access in ransomware attacks

Alexa+ now has a new “Adults Only” personality option that lets you swear but stays out of NSFW content

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Rust-based VENON malware targets 33 Brazilian banks with credential-stealing overlay
Identity

Rust-based VENON malware targets 33 Brazilian banks with credential-stealing overlay

userBy userMarch 12, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 12, 2026Malware/Cybercrime

Rust-based VENON malware

Cybersecurity researchers have revealed details of a new banking malware written in Rust that targets users in Brazil. This is significantly different from other known Delphi-based malware families associated with the Latin American cybercrime ecosystem.

The malware is designed to infect Windows systems and was first discovered last month, codenamed VENON by Brazilian cybersecurity company ZenoX.

What’s notable about VENON is that its behavior is consistent with existing banking Trojans targeting this region, including Grandoreiro, Mekotio, and Coyote, especially with respect to features such as banking overlay logic, active window monitoring, and shortcut (LNK) hijacking mechanisms.

This malware is not from any previously documented group or campaign. However, an earlier version of the artifact dating back to January 2026 was found to expose the full path from the malware author’s development environment. The path repeatedly references the Windows machine’s username “byst4” (for example, “C:\Users\byst4\…”).

“Rust’s code structure exhibits patterns that suggest that developers familiar with the functionality of existing Latin American banking Trojans used generative AI to rewrite and extend these functionality in Rust. This is a language that requires significant technical experience to use at the advanced level observed,” ZenoX said.

VENON is distributed through sophisticated infection chains that use DLL sideloading to launch malicious DLLs. The campaign is suspected of using social engineering tactics such as ClickFix to trick users into downloading a ZIP archive containing the payload using a PowerShell script.

Once the DLL is executed, it performs nine evasion techniques including anti-sandbox checks, indirect system calls, ETW bypass, and AMSI bypass before actually initiating malicious actions. It also accesses the Google Cloud Storage URL to retrieve configuration, install scheduled tasks, and establish a WebSocket connection to the command and control (C2) server.

The DLL also extracts two Visual Basic Script blocks that implement a shortcut hijacking mechanism intended only for the Itaú banking application. This component works by replacing legitimate system shortcuts with modified versions that redirect victims to web pages under the attacker’s control.

The attack also supports an uninstall procedure that reverts changes, suggesting that operators may be able to remotely control operations and revert shortcuts to cover their tracks.

Overall, this banking malware is equipped to target 33 financial institutions and digital asset platforms by monitoring window titles and active browser domains, operates only when the targeted application or website is opened, and facilitates credential theft by providing a fake overlay.

The disclosure comes amid a campaign in which threat actors exploited WhatsApp’s popularity in Brazil to distribute a worm named SORVEPOTEL via the desktop web version of the messaging platform. This attack relies on exploiting pre-authenticated chats to deliver malicious decoys directly to victims, ultimately leading to the deployment of banking malware such as Maverick, Casbaneiro, and Astaroth.

“A single WhatsApp message delivered through a hijacked SORVEPOTEL session was enough to draw the victim into a multi-step chain that ultimately resulted in the Astaroth implant being fully executed in memory,” Blackpoint Cyber ​​said.

“The combination of local automation tools, unsupervised browser drivers, and a user-writable runtime created an unusually permissive environment that allowed both the worm and the final payload to establish themselves with minimal friction.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHive0163 uses AI-assisted Slopoly malware for persistent access in ransomware attacks
user
  • Website

Related Posts

Hive0163 uses AI-assisted Slopoly malware for persistent access in ransomware attacks

March 12, 2026

How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs

March 12, 2026

OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More

March 12, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Rust-based VENON malware targets 33 Brazilian banks with credential-stealing overlay

Hive0163 uses AI-assisted Slopoly malware for persistent access in ransomware attacks

Alexa+ now has a new “Adults Only” personality option that lets you swear but stays out of NSFW content

Wonderful raises $150 million in Series B at $2 billion valuation

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.