Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Coyote Banking Trojan First to Abuse Microsoft UIA

Posted on July 23, 2025July 23, 2025 By CWS

Akamai has analyzed a current variant of the Coyote banking trojan and located that it abuses Microsoft’s UI Automation (UIA) framework to acquire knowledge from compromised units.

In actual fact, Akamai says Coyote is the primary piece of malware to abuse the UIA framework.

The malware has been round since at the least February 2024, getting used to focus on Home windows units in Latin America. It leverages keylogging and phishing overlays to gather victims’ knowledge, significantly credentials for banking and cryptocurrency providers. 

UIA is an accessibility framework for Home windows functions, offering programmatic entry to UI parts on the desktop. “It permits assistive expertise merchandise, similar to display readers, to offer details about the UI to finish customers and to control the UI by means apart from customary enter,” based on Microsoft.

Akamai warned in December 2024 that risk actors may exploit UIA for malicious functions by getting a consumer to run a specifically crafted software that leverages the framework. 

The corporate’s researchers confirmed how an attacker may abuse UIA for stealthy command execution, browser redirections, and delicate knowledge theft. Assaults work on any model of Home windows since XP and so they can bypass endpoint detection and response options. 

Akamai just lately found that the danger isn’t just theoretical, and malware builders have began abusing UIA, with Coyote apparently being the primary piece of malware to take action within the wild.

Whereas UIA could possibly be abused to steal delicate knowledge, Coyote builders are abusing it to find out which monetary providers are being utilized by the sufferer. The malware first makes use of a Home windows API to acquire the title of opened home windows in an effort to see in the event that they match an inventory of hardcoded web site addresses related to banks and cryptocurrency providers. Commercial. Scroll to proceed studying.

If it doesn’t discover a match, the malware makes use of UIA to “parse by the UI little one parts of the window”. This allows it to test browser tabs and handle bars to see in the event that they match the hardcoded web site addresses. 

“With out UIA, parsing the sub-elements of one other software is a nontrivial process,” Akamai’s Tomer Peled defined in a weblog put up. “To have the ability to successfully learn the contents of sub-elements inside one other software, a developer would wish to have an excellent understanding of how the particular goal software is structured.”

“Coyote can carry out checks, no matter whether or not the malware is on-line or working in an offline mode. This will increase the probabilities of efficiently figuring out a sufferer’s financial institution or crypto trade and stealing their credentials,” Peled added.

Associated: New Interlock RAT Variant Distributed by way of FileFix Assaults

Associated: Lumma Stealer Malware Returns After Takedown Try

Associated: Iranian APT Targets Android Customers With New Variants of DCHSpy Adware

Security Week News Tags:Abuse, Banking, Coyote, Microsoft, Trojan, UIA

Post navigation

Previous Post: Ransomware Gangs Leveraging RMM Tools to Attack Organizations and Exfiltrate Data
Next Post: UK’s Ransomware Payment Ban: Bold Strategy or Dangerous Gamble?

Related Posts

1.2 Million Impacted by WestJet Data Breach Security Week News
Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities Security Week News
240,000 Impacted by Data Breach at Eyecare Tech Firm Ocuco Security Week News
US Sanctions Russian National, Chinese Firm Aiding North Korean IT Workers Security Week News
Critical OpenPGP.js Vulnerability Allows Spoofing Security Week News
Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Exploitation of Critical Adobe Commerce Flaw Puts Many eCommerce Sites at Risk
  • Lanscope Endpoint Manager Zero-Day Exploited in the Wild
  • Impacket Tool in Kali Repo Upgraded With New Attack Paths and Relay Tricks
  • DHS Asks OpenAI To Share Information on ChatGPT Prompts Used By Users
  • “Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Exploitation of Critical Adobe Commerce Flaw Puts Many eCommerce Sites at Risk
  • Lanscope Endpoint Manager Zero-Day Exploited in the Wild
  • Impacket Tool in Kali Repo Upgraded With New Attack Paths and Relay Tricks
  • DHS Asks OpenAI To Share Information on ChatGPT Prompts Used By Users
  • “Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News