Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Coyote Banking Trojan First to Abuse Microsoft UIA

Posted on July 23, 2025July 23, 2025 By CWS

Akamai has analyzed a current variant of the Coyote banking trojan and located that it abuses Microsoft’s UI Automation (UIA) framework to acquire knowledge from compromised units.

In actual fact, Akamai says Coyote is the primary piece of malware to abuse the UIA framework.

The malware has been round since at the least February 2024, getting used to focus on Home windows units in Latin America. It leverages keylogging and phishing overlays to gather victims’ knowledge, significantly credentials for banking and cryptocurrency providers. 

UIA is an accessibility framework for Home windows functions, offering programmatic entry to UI parts on the desktop. “It permits assistive expertise merchandise, similar to display readers, to offer details about the UI to finish customers and to control the UI by means apart from customary enter,” based on Microsoft.

Akamai warned in December 2024 that risk actors may exploit UIA for malicious functions by getting a consumer to run a specifically crafted software that leverages the framework. 

The corporate’s researchers confirmed how an attacker may abuse UIA for stealthy command execution, browser redirections, and delicate knowledge theft. Assaults work on any model of Home windows since XP and so they can bypass endpoint detection and response options. 

Akamai just lately found that the danger isn’t just theoretical, and malware builders have began abusing UIA, with Coyote apparently being the primary piece of malware to take action within the wild.

Whereas UIA could possibly be abused to steal delicate knowledge, Coyote builders are abusing it to find out which monetary providers are being utilized by the sufferer. The malware first makes use of a Home windows API to acquire the title of opened home windows in an effort to see in the event that they match an inventory of hardcoded web site addresses related to banks and cryptocurrency providers. Commercial. Scroll to proceed studying.

If it doesn’t discover a match, the malware makes use of UIA to “parse by the UI little one parts of the window”. This allows it to test browser tabs and handle bars to see in the event that they match the hardcoded web site addresses. 

“With out UIA, parsing the sub-elements of one other software is a nontrivial process,” Akamai’s Tomer Peled defined in a weblog put up. “To have the ability to successfully learn the contents of sub-elements inside one other software, a developer would wish to have an excellent understanding of how the particular goal software is structured.”

“Coyote can carry out checks, no matter whether or not the malware is on-line or working in an offline mode. This will increase the probabilities of efficiently figuring out a sufferer’s financial institution or crypto trade and stealing their credentials,” Peled added.

Associated: New Interlock RAT Variant Distributed by way of FileFix Assaults

Associated: Lumma Stealer Malware Returns After Takedown Try

Associated: Iranian APT Targets Android Customers With New Variants of DCHSpy Adware

Security Week News Tags:Abuse, Banking, Coyote, Microsoft, Trojan, UIA

Post navigation

Previous Post: Ransomware Gangs Leveraging RMM Tools to Attack Organizations and Exfiltrate Data
Next Post: UK’s Ransomware Payment Ban: Bold Strategy or Dangerous Gamble?

Related Posts

Thousands Hit by The North Face Credential Stuffing Attack Security Week News
Nippon Steel Subsidiary Blames Data Breach on Zero-Day Attack Security Week News
Aflac Finds Suspicious Activity on US Network That May Impact Social Security Numbers, Other Data Security Week News
EU Unveils AI Code of Practice to Help Businesses Comply With Bloc’s Rules Security Week News
Popular Scraping Tool’s NPM Package Compromised in Supply Chain Attack Security Week News
Interpol Targets Infostealers: 20,000 IPs Taken Down, 32 Arrested, 216,000 Victims Notified Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Lazarus APT Hackers Using ClickFix Technique to Steal Sensitive Intelligence Data
  • How to Use End-to-End Encrypted Email
  • Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks
  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Lazarus APT Hackers Using ClickFix Technique to Steal Sensitive Intelligence Data
  • How to Use End-to-End Encrypted Email
  • Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks
  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News