Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials

Posted on July 23, 2025July 23, 2025 By CWS

A groundbreaking cybersecurity menace has emerged as researchers doc the primary confirmed case of malware exploiting Microsoft’s Consumer Interface Automation (UIA) framework in lively assaults.

The Coyote banking trojan, initially found in February 2024, has advanced to include this refined approach, marking a major escalation in malware capabilities and assault methodologies.

The malware particularly targets Brazilian customers and monetary establishments, leveraging UIA to extract credentials from 75 totally different banking institutes and cryptocurrency exchanges.

This represents a notable development from theoretical proof-of-concept demonstrations to real-world exploitation, validating long-standing considerations in regards to the potential misuse of Microsoft’s accessibility framework.

Coyote operates as a conventional banking trojan however distinguishes itself by means of its modern method to credential harvesting.

The malware employs standard strategies together with keylogging and phishing overlays whereas using the Squirrel installer for propagation, incomes its title from the predator-prey relationship between coyotes and squirrels.

Akamai researchers recognized this variant as significantly harmful because of its capacity to function each on-line and offline, considerably rising its effectiveness in figuring out and concentrating on victims’ monetary companies.

The malware’s an infection mechanism demonstrates refined technical execution.

An infection Mechanism – Leveraging Microsoft UI Automation

Initially, Coyote invokes the GetForegroundWindow() Home windows API to acquire a deal with to the presently lively window, then compares the window title in opposition to a hardcoded checklist of focused banking and cryptocurrency change internet addresses.

UIA creation (Supply – Akamai)

When no direct match happens, the malware transitions to its UIA exploitation section. Throughout UIA abuse, Coyote creates a UIAutomation COM object utilizing the foreground window as its high factor.

UIA iterates by means of sub-elements (Supply – Akamai)

The malware systematically iterates by means of every sub-element of the foreground software to find browser tabs or deal with bars containing related monetary service URLs.

This course of permits Coyote to parse UI little one parts throughout totally different purposes with out requiring detailed information of particular software constructions.

The malware then cross-references found internet addresses with its predefined goal checklist which categorizes establishments by sort together with main Brazilian banks like Banco do Brasil, CaixaBank, and Banco Bradesco, alongside numerous cryptocurrency platforms.

This UIA implementation supplies attackers with a common answer for accessing sub-elements throughout a number of purposes, representing a regarding evolution in malware sophistication that safety professionals should deal with by means of enhanced monitoring of UIAutomationCore.dll utilization and UIA-related named pipes.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Abuses, Automation, Coyote, Credentials, Exfiltrate, Login, Malware, Microsofts, Wild

Post navigation

Previous Post: Windows 11 Gets New AI-Powered Features
Next Post: Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China

Related Posts

Google Warns of Cybercriminals Increasingly Attacking US Users to Steal Login Credentials Cyber Security News
PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication Cyber Security News
AI Browsers Bypass Content PayWall Mimicking as a Human-User Cyber Security News
AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes Cyber Security News
CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks Cyber Security News
Google Vulnerability Let Attackers Access Any Google User Phone Number Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Surge in Attacks Targeting RSC-Enabled Services Worldwide
  • In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy
  • New JSCEAL Infostealer Malware Attacking Windows Systems to Steal Login Credentials
  • New Research Details on What Happens to Data Stolen in a Phishing Attack
  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Surge in Attacks Targeting RSC-Enabled Services Worldwide
  • In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy
  • New JSCEAL Infostealer Malware Attacking Windows Systems to Steal Login Credentials
  • New Research Details on What Happens to Data Stolen in a Phishing Attack
  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark