Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Janela RAT Malware Targets Latin American Financial Sector

Janela RAT Malware Targets Latin American Financial Sector

Posted on April 14, 2026 By CWS

A sophisticated malware operation, identified as Janela RAT, is targeting financial entities and cryptocurrency services throughout Latin America. This campaign employs deceptive MSI installer files and harmful browser extensions to access sensitive financial information from victims.

Janela RAT: A New Threat in Latin America

Initially detected in mid-2023, Janela RAT is considered an evolved form of the older BX RAT, now enhanced with advanced functionalities. The malware is specifically designed to target individuals and organizations in Chile, Colombia, and Mexico, with a focus on the banking, fintech, and cryptocurrency industries.

The attackers behind Janela RAT are financially driven, aiming to steal credentials and gain unauthorized access to financial accounts. According to KPMG experts, this multi-layered attack poses a significant risk to the financial infrastructure in the region.

How Janela RAT Operates

Researchers have observed that Janela RAT masquerades as legitimate software on public GitLab repositories, complicating detection. This campaign’s ability to silently manipulate browser settings and maintain encrypted communication with attacker-operated servers makes it challenging to counteract.

The implications of this campaign extend beyond mere data theft. By accessing browser information such as cookies, saved credentials, and browsing history, attackers can fully monitor and control a victim’s financial activities. This level of intrusion allows for account takeover and real-time transaction monitoring without the victim’s knowledge, posing severe operational and reputational risks to affected organizations.

Technical Details and Defensive Measures

The infection process begins when a user unknowingly executes an MSI-format software installer from a public GitLab repository. This installer initiates a sequence of scripts—written in Go, PowerShell, and batch—each contributing to the malware’s deployment. A Go-based unpacker is used to extract encrypted command-and-control (C2) information, which is then stored in a config.json file for ongoing operations.

Simultaneously, the scripts search for any Chromium-based browsers on the machine, modify their startup settings, and install a malicious extension to harvest sensitive data. The extension functions as a native messaging host, gathering system details, cookies, browsing history, and more. It also monitors for specific URL patterns, triggering further actions upon encountering banking or cryptocurrency sites.

To remain undetected, Janela RAT employs encrypted WebSocket connections and obfuscates its communication domains. It dynamically changes C2 addresses and remains inactive during idle periods to avoid detection by behavior-based security systems.

Security teams are encouraged to monitor their environments for known Indicators of Compromise (IoCs) related to Janela RAT. It is crucial to ensure all Windows systems are updated and protected with multi-factor authentication. Conducting comprehensive threat assessments can help identify vulnerabilities and improve security defenses.

Cyber Security News Tags:browser hijacking, Cryptocurrency, Cybersecurity, data theft, financial sector, Janela RAT, KPMG, Latin America, Malware, RAT

Post navigation

Previous Post: CISA Alerts on Critical Windows and Adobe Vulnerabilities
Next Post: Adobe Fixes 55 Security Flaws in Multiple Products

Related Posts

MEA Faces Surge in Shipping Scams Exploiting Phishing Tactics MEA Faces Surge in Shipping Scams Exploiting Phishing Tactics Cyber Security News
Acer Control Center Vulnerability Let Attackers Execute Malicious Code as a Privileged User Acer Control Center Vulnerability Let Attackers Execute Malicious Code as a Privileged User Cyber Security News
ERMAC v3.0 Banking Malware Source Code Exposed via Weak Password ERMAC v3.0 Banking Malware Source Code Exposed via Weak Password Cyber Security News
Hackers Leverage Malicious PyPI Package to Attack Users and Steal Cryptocurrency Details Hackers Leverage Malicious PyPI Package to Attack Users and Steal Cryptocurrency Details Cyber Security News
Discord Data Breach – 1.5 TB of Data and 2 Million Government ID Photos Extorted Discord Data Breach – 1.5 TB of Data and 2 Million Government ID Photos Extorted Cyber Security News
FBI Warns of Ploutus Malware Draining ATMs Nationwide FBI Warns of Ploutus Malware Draining ATMs Nationwide Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Nginx Servers at Risk Due to Exploited Vulnerability
  • April Patch Tuesday: Critical Vulnerabilities Addressed
  • Tech Giants Under Fire for Ignoring Privacy Opt-Outs
  • Capsule Security Unveils AI Protection with $7M Funding
  • Critical nginx-ui Flaw Allows Full Server Control

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Nginx Servers at Risk Due to Exploited Vulnerability
  • April Patch Tuesday: Critical Vulnerabilities Addressed
  • Tech Giants Under Fire for Ignoring Privacy Opt-Outs
  • Capsule Security Unveils AI Protection with $7M Funding
  • Critical nginx-ui Flaw Allows Full Server Control

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark