Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

After selling its shoe business, Allbirds shifts focus to AI

Actively exploited nginx-ui flaw (CVE-2026-33032) allows complete takeover of Nginx servers

How electric vehicles will change emergency response

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » JanelaRAT malware targets Latin American banks with 14,739 attacks in Brazil in 2025
Identity

JanelaRAT malware targets Latin American banks with 14,739 attacks in Brazil in 2025

By April 13, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananApril 13, 2026Threat Intelligence/Malware

Banks and financial institutions in Latin American countries such as Brazil and Mexico continue to be targeted by a malware family called JanelaRAT.

JanelaRAT, a modified version of BX RAT, is known to track mouse inputs, log keystrokes, take screenshots, and collect system metadata, as well as steal financial and cryptocurrency data associated with certain financial entities.

“One of the key differences between these Trojans is that JanelaRAT uses a custom title bar detection mechanism to identify the desired website in the victim’s browser and perform its malicious actions,” Kaspersky said in a report released today. “The attackers behind the JanelaRAT campaign are continually updating their infection chains and malware versions by adding new features.”

According to telemetry data collected by Russian cybersecurity vendors, as many as 14,739 attacks were recorded in Brazil and 11,695 in Mexico in 2025. At this time, it is unclear how many of these were successfully compromised.

First detected in the wild by Zscaler in June 2023, JanelaRAT leveraged a ZIP archive containing Visual Basic Script (VBScript) to download a second ZIP file that contained a legitimate executable and DLL payload. The final stage uses DLL sideloading techniques to launch the Trojan.

In a subsequent analysis published in July 2025, KPMG said the malware is being distributed via malicious MSI installer files disguised as legitimate software hosted on trusted platforms like GitLab. Attacks involving this malware primarily target Chile, Colombia, and Mexico.

“Once executed, the installer begins a multi-step infection process using Go, PowerShell, and a coordinated script written in batch,” KPMG noted at the time. “These scripts unzip ZIP archives containing RAT executables, malicious Chromium-based browser extensions, and supporting components.”

The script is designed to identify an installed Chromium-based browser and covertly modify its startup parameters (such as the “–load-extension” command line switch) to install the extension. The browser add-on then collects system information, cookies, browsing history, installed extensions, tab metadata, and triggers specific actions based on matching URL patterns.

The latest attack chain documented by Kaspersky Lab shows a phishing email disguised as an unpaid invoice tricking the recipient into clicking on a link to download a PDF file, which in turn downloads a ZIP archive and initiates the aforementioned attack chain with DLL sideloading to install JanelaRAT.

Since at least May 2024, JanelaRAT campaigns have migrated from Visual Basic scripts to MSI installers. The MSI installer uses DLL sideloading to act as a malware dropper and establish persistence on the host by creating a Windows shortcut (LNK) in the startup folder that points to the executable file.

Once executed, the malware establishes communication with a command and control (C2) server via TCP sockets to register successful infection, monitor victim activity, and intercept sensitive banking transactions.

JanelaRAT’s main purpose is to obtain the title of the active window and compare it to a hard-coded list of financial institutions. If a match is found, the malware waits 12 seconds before opening a dedicated C2 channel and executing the malicious task received from the server. Supported commands include:

Send screenshots to C2 servers Crop and extract images from specific screen areas Show images in full screen mode (e.g. “Configuring Windows Updates. Please wait”) and collect credentials by disguising banking-themed dialogs via fake overlays Capturing keystrokes Simulating keyboard actions such as DOWN, UP, and TAB for navigation Moving the cursor and simulating clicks Performing a forced system shutdown Scripts that run commands using “cmd.exe” and PowerShell commands Manipulates the Windows Task Manager to prevent windows from being detected Flags the presence of anti-cheat systems Sends system metadata Detects sandboxing and automation tools

“The malware determines if the victim’s machine has been inactive for more than 10 minutes by calculating the time since the last user input,” Kaspersky said. “If the period of inactivity exceeds 10 minutes, the malware sends a corresponding message to notify the C2. When user activity occurs, it again notifies the threat actor. This allows it to track the user’s presence and the time of possible remote operations.”

“This variant represents a significant advancement in the attacker’s capabilities, combining multiple communication channels, comprehensive victim monitoring, interactive overlays, input injection, and robust remote control capabilities. The malware is specifically designed to minimize user visibility and adapt its behavior upon detection by anti-malware software.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBooking.com confirms hackers accessed customer data
Next Article ‘We still haven’t processed what we just did’: Artemis II astronauts tell all at first press conference after splashdown

Related Posts

Actively exploited nginx-ui flaw (CVE-2026-33032) allows complete takeover of Nginx servers

April 15, 2026

What you need for public verification of your architecture

April 15, 2026

Microsoft issues patches for SharePoint zero-day and 168 other new vulnerabilities

April 15, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

After selling its shoe business, Allbirds shifts focus to AI

Actively exploited nginx-ui flaw (CVE-2026-33032) allows complete takeover of Nginx servers

How electric vehicles will change emergency response

HBO Max comes to India with exclusive deal from JioHotstar

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.