Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials

New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials

Posted on July 23, 2025July 23, 2025 By CWS

Jul 23, 2025Ravie LakshmananWindows Safety / Cryptocurrency
The Home windows banking trojan referred to as Coyote has grow to be the primary identified malware pressure to take advantage of the Home windows accessibility framework referred to as UI Automation (UIA) to reap delicate info.
“The brand new Coyote variant is concentrating on Brazilian customers, and makes use of UIA to extract credentials linked to 75 banking institutes’ internet addresses and cryptocurrency exchanges,” Akamai safety researcher Tomer Peled mentioned in an evaluation.
Coyote, first revealed by Kaspersky in 2024, is understood for concentrating on Brazilian customers. It comes with capabilities to log keystrokes, seize screenshots, and serve overlays on high of login pages related to monetary enterprises.
A part of the Microsoft .NET Framework, UIA is a reputable characteristic provided by Microsoft to permit display readers and different assistive know-how merchandise to programmatically entry person interface (UI) parts on a desktop.

That UIA could be a potential pathway for abuse, together with information theft, was beforehand demonstrated as a proof-of-concept (PoC) by Akamai in December 2024, with the net infrastructure firm noting that it could possibly be used to steal credentials or execute code.
In some methods, Coyote’s newest modus operandi mirrors the varied Android banking trojans which were noticed within the wild, which frequently weaponize the working system’s accessibility companies to acquire invaluable information.
Akamai’s evaluation discovered that the malware invokes the GetForegroundWindow() Home windows API so as to extract the energetic window’s title and examine it in opposition to a hard-coded record of internet addresses belonging to focused banks and cryptocurrency exchanges.
“If no match is discovered Coyote will then use UIA to parse by way of the UI baby parts of the window in an try to establish browser tabs or tackle bars,” Peled defined. “The content material of those UI parts will then be cross-referenced with the identical record of addresses from the primary comparability.”
As many as 75 completely different monetary establishments are focused by the newest model of the malware, up from 73 documented by Fortinet FortiGuard Labs earlier this January.

“With out UIA, parsing the sub-elements of one other utility is a nontrivial process,” Akamai added. “To have the ability to successfully learn the contents of sub-elements inside one other utility, a developer would want to have an excellent understanding of how the particular goal utility is structured.”
“Coyote can carry out checks, no matter whether or not the malware is on-line or working in an offline mode. This will increase the probabilities of efficiently figuring out a sufferer’s financial institution or crypto trade and stealing their credentials.”

The Hacker News Tags:Automation, Banking, Coyote, Credentials, Exploits, Malware, Steal, Variant, Windows

Post navigation

Previous Post: Should We Trust AI? Three Approaches to AI Fallibility
Next Post: OpenAI’s Sam Altman Warns of AI Voice Fraud Crisis in Banking

Related Posts

SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers The Hacker News
Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection The Hacker News
Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks The Hacker News
iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More The Hacker News
15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign 15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign The Hacker News
Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News