Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Coyote Banking Trojan First to Abuse Microsoft UIA

Posted on July 23, 2025July 23, 2025 By CWS

Akamai has analyzed a current variant of the Coyote banking trojan and located that it abuses Microsoft’s UI Automation (UIA) framework to acquire knowledge from compromised units.

In actual fact, Akamai says Coyote is the primary piece of malware to abuse the UIA framework.

The malware has been round since at the least February 2024, getting used to focus on Home windows units in Latin America. It leverages keylogging and phishing overlays to gather victims’ knowledge, significantly credentials for banking and cryptocurrency providers. 

UIA is an accessibility framework for Home windows functions, offering programmatic entry to UI parts on the desktop. “It permits assistive expertise merchandise, similar to display readers, to offer details about the UI to finish customers and to control the UI by means apart from customary enter,” based on Microsoft.

Akamai warned in December 2024 that risk actors may exploit UIA for malicious functions by getting a consumer to run a specifically crafted software that leverages the framework. 

The corporate’s researchers confirmed how an attacker may abuse UIA for stealthy command execution, browser redirections, and delicate knowledge theft. Assaults work on any model of Home windows since XP and so they can bypass endpoint detection and response options. 

Akamai just lately found that the danger isn’t just theoretical, and malware builders have began abusing UIA, with Coyote apparently being the primary piece of malware to take action within the wild.

Whereas UIA could possibly be abused to steal delicate knowledge, Coyote builders are abusing it to find out which monetary providers are being utilized by the sufferer. The malware first makes use of a Home windows API to acquire the title of opened home windows in an effort to see in the event that they match an inventory of hardcoded web site addresses related to banks and cryptocurrency providers. Commercial. Scroll to proceed studying.

If it doesn’t discover a match, the malware makes use of UIA to “parse by the UI little one parts of the window”. This allows it to test browser tabs and handle bars to see in the event that they match the hardcoded web site addresses. 

“With out UIA, parsing the sub-elements of one other software is a nontrivial process,” Akamai’s Tomer Peled defined in a weblog put up. “To have the ability to successfully learn the contents of sub-elements inside one other software, a developer would wish to have an excellent understanding of how the particular goal software is structured.”

“Coyote can carry out checks, no matter whether or not the malware is on-line or working in an offline mode. This will increase the probabilities of efficiently figuring out a sufferer’s financial institution or crypto trade and stealing their credentials,” Peled added.

Associated: New Interlock RAT Variant Distributed by way of FileFix Assaults

Associated: Lumma Stealer Malware Returns After Takedown Try

Associated: Iranian APT Targets Android Customers With New Variants of DCHSpy Adware

Security Week News Tags:Abuse, Banking, Coyote, Microsoft, Trojan, UIA

Post navigation

Previous Post: Ransomware Gangs Leveraging RMM Tools to Attack Organizations and Exfiltrate Data
Next Post: UK’s Ransomware Payment Ban: Bold Strategy or Dangerous Gamble?

Related Posts

Email Protection Startup StrongestLayer Emerges From Stealth Mode Security Week News
Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments Security Week News
The UK Brings Cyberwarfare Out of the Closet Security Week News
Cisco’s Quantum Bet: Linking Small Machines Into One Giant Quantum Computer Security Week News
Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments Security Week News
$223 Million Stolen in Cetus Protocol Hack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News