Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Rust-Based VENON Malware Targets Brazilian Banks

Rust-Based VENON Malware Targets Brazilian Banks

Posted on March 12, 2026 By CWS

In a recent cybersecurity development, experts have identified a new banking malware, crafted in Rust, that specifically targets Brazilian users. This malware, dubbed VENON by the cybersecurity firm ZenoX, marks a significant departure from the traditional Delphi-based threats commonly associated with the Latin American cybercrime landscape.

New Malware Targets Windows Systems

VENON, first detected last month, is engineered to infiltrate Windows operating systems. Its emergence represents a shift in strategy compared to previous malware families like Grandoreiro and Mekotio, as it incorporates features such as banking overlay logic, active window monitoring, and shortcut (LNK) hijacking mechanisms. Despite its sophisticated design, the malware has not been linked to any known cybercrime groups or campaigns.

Technical Insights and Distribution Tactics

The malware’s development showcases a familiarity with Latin American banking trojans, as suggested by its Rust code structure. Notably, VENON employs DLL side-loading to execute a malicious DLL, with distribution likely facilitated through social engineering tactics like ClickFix. Users are tricked into downloading a ZIP archive via a PowerShell script, which initiates the infection chain.

Once the DLL is activated, it employs numerous evasion techniques, including anti-sandbox checks and AMSI bypasses, before proceeding to its malicious tasks. It communicates with a Google Cloud Storage URL to obtain configuration details and establishes a WebSocket connection to a command-and-control server.

Impact and Broader Threat Landscape

VENON’s attack strategy is comprehensive, targeting 33 financial institutions and digital asset platforms. It uses browser and window monitoring to deploy fake overlays for credential theft, particularly targeting the Itaú banking application by hijacking system shortcuts.

The malware’s disclosure coincides with ongoing campaigns exploiting WhatsApp’s popularity in Brazil, where a worm named SORVEPOTEL is used to spread banking malware such as Maverick and Astaroth. This method involves leveraging WhatsApp’s desktop version to deliver malicious links through compromised chats, leading to the execution of malware directly in memory.

As the threat landscape evolves, VENON’s sophisticated approach underscores the growing complexity of cyber threats facing financial institutions. Continuous vigilance and advanced protective measures are crucial to counteract such innovative malware tactics.

The Hacker News Tags:banking trojans, Brazilian banks, credential theft, cyber threats, Cybercrime, Cybersecurity, DLL side-loading, malware analysis, Rust programming, social engineering, VENON malware, WhatsApp exploitation, ZenoX

Post navigation

Previous Post: Critical SolarWinds Vulnerability Demands Immediate Action
Next Post: AI-Powered Slopoly Malware Boosts Hive0163’s Ransomware Tactics

Related Posts

ZeroDayRAT Spyware Threatens Android and iOS Security ZeroDayRAT Spyware Threatens Android and iOS Security The Hacker News
TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution The Hacker News
Pixel Zero-Click, Redis RCE, China C2s, RAT Ads, Crypto Scams & 15+ Stories Pixel Zero-Click, Redis RCE, China C2s, RAT Ads, Crypto Scams & 15+ Stories The Hacker News
Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access The Hacker News
Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures The Hacker News
New Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud and Screen Control New Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud and Screen Control The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Spectrum Security Secures $19 Million in Funding
  • Windows Shell Vulnerability Exploited, Microsoft Confirms
  • OilRig Hides C2 Data in Images on Google Drive with Steganography
  • Medtronic Confirms Breach Amid ShinyHunters Threat
  • Microsoft Fixes Entra ID Flaw Allowing Identity Takeover

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Spectrum Security Secures $19 Million in Funding
  • Windows Shell Vulnerability Exploited, Microsoft Confirms
  • OilRig Hides C2 Data in Images on Google Drive with Steganography
  • Medtronic Confirms Breach Amid ShinyHunters Threat
  • Microsoft Fixes Entra ID Flaw Allowing Identity Takeover

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark