Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials

Posted on July 23, 2025July 23, 2025 By CWS

A groundbreaking cybersecurity menace has emerged as researchers doc the primary confirmed case of malware exploiting Microsoft’s Consumer Interface Automation (UIA) framework in lively assaults.

The Coyote banking trojan, initially found in February 2024, has advanced to include this refined approach, marking a major escalation in malware capabilities and assault methodologies.

The malware particularly targets Brazilian customers and monetary establishments, leveraging UIA to extract credentials from 75 totally different banking institutes and cryptocurrency exchanges.

This represents a notable development from theoretical proof-of-concept demonstrations to real-world exploitation, validating long-standing considerations in regards to the potential misuse of Microsoft’s accessibility framework.

Coyote operates as a conventional banking trojan however distinguishes itself by means of its modern method to credential harvesting.

The malware employs standard strategies together with keylogging and phishing overlays whereas using the Squirrel installer for propagation, incomes its title from the predator-prey relationship between coyotes and squirrels.

Akamai researchers recognized this variant as significantly harmful because of its capacity to function each on-line and offline, considerably rising its effectiveness in figuring out and concentrating on victims’ monetary companies.

The malware’s an infection mechanism demonstrates refined technical execution.

An infection Mechanism – Leveraging Microsoft UI Automation

Initially, Coyote invokes the GetForegroundWindow() Home windows API to acquire a deal with to the presently lively window, then compares the window title in opposition to a hardcoded checklist of focused banking and cryptocurrency change internet addresses.

UIA creation (Supply – Akamai)

When no direct match happens, the malware transitions to its UIA exploitation section. Throughout UIA abuse, Coyote creates a UIAutomation COM object utilizing the foreground window as its high factor.

UIA iterates by means of sub-elements (Supply – Akamai)

The malware systematically iterates by means of every sub-element of the foreground software to find browser tabs or deal with bars containing related monetary service URLs.

This course of permits Coyote to parse UI little one parts throughout totally different purposes with out requiring detailed information of particular software constructions.

The malware then cross-references found internet addresses with its predefined goal checklist which categorizes establishments by sort together with main Brazilian banks like Banco do Brasil, CaixaBank, and Banco Bradesco, alongside numerous cryptocurrency platforms.

This UIA implementation supplies attackers with a common answer for accessing sub-elements throughout a number of purposes, representing a regarding evolution in malware sophistication that safety professionals should deal with by means of enhanced monitoring of UIAutomationCore.dll utilization and UIA-related named pipes.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Abuses, Automation, Coyote, Credentials, Exfiltrate, Login, Malware, Microsofts, Wild

Post navigation

Previous Post: Windows 11 Gets New AI-Powered Features
Next Post: Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China

Related Posts

Armenian Hacker Extradited to U.S. After Ransomware Attacks on Tech Firms Cyber Security News
Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection Cyber Security News
North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups Cyber Security News
Microsoft Investigating Forms Service Issue Not Accessible for Users Cyber Security News
New Rust-based InfoStealer via Fake CAPTCHA Delivers EDDIESTEALER Cyber Security News
HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VOIP-Based Botnet Attacking Routers Configured With Default Password
  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VOIP-Based Botnet Attacking Routers Configured With Default Password
  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News