Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Chinese apt deploys egg stream fireless malware to infringe Philippine military systems

Vimeo is acquired by bending a spoon in a $1.38 billion all-cash transaction

Chillyhell Macos backdoor and Zinorrat rats threaten Macos, Windows and Linux Systems

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Coyote Malware Variants Abuse Windows UI Automation to Steal Bank Credentials
Identity

New Coyote Malware Variants Abuse Windows UI Automation to Steal Bank Credentials

userBy userJuly 23, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 23, 2025Ravi LakshmananWindows Security/Cryptocurrency

Windows Banking Trojan, known as Coyote, has become the first known malware strain to harvest sensitive information using a Windows accessibility framework called UI Automation (UIA).

“The new Coyote variant is targeting Brazilian users and uses the UIA to extract web addresses from 75 bank labs and credentials linked to cryptocurrency exchanges.”

First published by Kaspersky in 2024, Coyote is known for targeting Brazilian users. It has the ability to record keystrokes, capture screenshots, and provide overlays on top of login pages related to financial companies.

Part of the Microsoft .NET framework, UIA is a legitimate feature provided by Microsoft that allows screen readers and other assistive technology products to programmatically access user interface (UI) elements on the desktop.

Cybersecurity

The UIA has pointed out that it could be a potential route for abuse, including data theft, was previously demonstrated as a proof of concept (POC) by Akamai in December 2024, and that Web Infrastructure Company can be used to steal qualifications and execute code.

In a sense, Coyote’s latest modus operandi reflects a variety of Android banking Trojans discovered in the wild, often amassing valuable data using the accessibility services of the operating system.

Akamai’s analysis revealed that the malware calls the GetForeGroundWindow() Windows API to extract the title of the active window and compare it with a hard coding list of web addresses belonging to the target bank and cryptocurrency exchange.

“If no match is found, Coyote uses the UIA to parse the UI child elements of the window to identify the browser tab or address bar,” explained Peredo. “The contents of these UI elements are cross-referenced from the initial comparison with the same list of addresses.”

75 different financial institutions are targeting the latest versions of malware from 73, documented by Fortinet Fortiguard Labs in the beginning of January this year.

Cybersecurity

“In the absence of UIA, parsing sub-elements from another application is a non-trivial task,” Akamai added. “To be able to effectively read the contents of subelements within another application, developers need to have a very good understanding of the structure of a particular target application.”

“Coyotes can perform checks regardless of whether the malware is online or operating in offline mode. This will ensure that they successfully identify the victim’s bank or crypto exchange and are more likely to steal qualifications.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleProton’s new Privacy First AI Assistant encrypts all chats and does not keep logs
Next Article Eight months later, Swedish Unicorn Lovely Crosses a $100 million milestone
user
  • Website

Related Posts

Chinese apt deploys egg stream fireless malware to infringe Philippine military systems

September 10, 2025

Chillyhell Macos backdoor and Zinorrat rats threaten Macos, Windows and Linux Systems

September 10, 2025

Microsoft fixes 80 defects – including SMB PrivesC and Azure CVSS 10.0 bugs

September 10, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Chinese apt deploys egg stream fireless malware to infringe Philippine military systems

Vimeo is acquired by bending a spoon in a $1.38 billion all-cash transaction

Chillyhell Macos backdoor and Zinorrat rats threaten Macos, Windows and Linux Systems

Microsoft fixes 80 defects – including SMB PrivesC and Azure CVSS 10.0 bugs

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

Wearable Tech Deep Dive: The Science Behind Smartwatches and Your Health Goals

The Adaptable Healthcare Playbook: How TwinH Is Leading the Way

Smart Health, Seamless Integration: GooApps Leads the Way in 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.