Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Rust-Based VENON Malware Targets Brazilian Banks

Rust-Based VENON Malware Targets Brazilian Banks

Posted on March 12, 2026 By CWS

In a recent cybersecurity development, experts have identified a new banking malware, crafted in Rust, that specifically targets Brazilian users. This malware, dubbed VENON by the cybersecurity firm ZenoX, marks a significant departure from the traditional Delphi-based threats commonly associated with the Latin American cybercrime landscape.

New Malware Targets Windows Systems

VENON, first detected last month, is engineered to infiltrate Windows operating systems. Its emergence represents a shift in strategy compared to previous malware families like Grandoreiro and Mekotio, as it incorporates features such as banking overlay logic, active window monitoring, and shortcut (LNK) hijacking mechanisms. Despite its sophisticated design, the malware has not been linked to any known cybercrime groups or campaigns.

Technical Insights and Distribution Tactics

The malware’s development showcases a familiarity with Latin American banking trojans, as suggested by its Rust code structure. Notably, VENON employs DLL side-loading to execute a malicious DLL, with distribution likely facilitated through social engineering tactics like ClickFix. Users are tricked into downloading a ZIP archive via a PowerShell script, which initiates the infection chain.

Once the DLL is activated, it employs numerous evasion techniques, including anti-sandbox checks and AMSI bypasses, before proceeding to its malicious tasks. It communicates with a Google Cloud Storage URL to obtain configuration details and establishes a WebSocket connection to a command-and-control server.

Impact and Broader Threat Landscape

VENON’s attack strategy is comprehensive, targeting 33 financial institutions and digital asset platforms. It uses browser and window monitoring to deploy fake overlays for credential theft, particularly targeting the Itaú banking application by hijacking system shortcuts.

The malware’s disclosure coincides with ongoing campaigns exploiting WhatsApp’s popularity in Brazil, where a worm named SORVEPOTEL is used to spread banking malware such as Maverick and Astaroth. This method involves leveraging WhatsApp’s desktop version to deliver malicious links through compromised chats, leading to the execution of malware directly in memory.

As the threat landscape evolves, VENON’s sophisticated approach underscores the growing complexity of cyber threats facing financial institutions. Continuous vigilance and advanced protective measures are crucial to counteract such innovative malware tactics.

The Hacker News Tags:banking trojans, Brazilian banks, credential theft, cyber threats, Cybercrime, Cybersecurity, DLL side-loading, malware analysis, Rust programming, social engineering, VENON malware, WhatsApp exploitation, ZenoX

Post navigation

Previous Post: Critical SolarWinds Vulnerability Demands Immediate Action
Next Post: AI-Powered Slopoly Malware Boosts Hive0163’s Ransomware Tactics

Related Posts

How To Browse Faster and Get More Done Using Adapt Browser How To Browse Faster and Get More Done Using Adapt Browser The Hacker News
Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens The Hacker News
GPT-5 Agent That Finds and Fixes Code Flaws Automatically GPT-5 Agent That Finds and Fixes Code Flaws Automatically The Hacker News
Ransomware Defense Using the Wazuh Open Source Platform Ransomware Defense Using the Wazuh Open Source Platform The Hacker News
Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google Chrome Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google Chrome The Hacker News
Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI-Powered Slopoly Malware Boosts Hive0163’s Ransomware Tactics
  • Rust-Based VENON Malware Targets Brazilian Banks
  • Critical SolarWinds Vulnerability Demands Immediate Action
  • North Korean Hackers Linked to Massive Polyfill Attack
  • Microsoft OAuth Device Phishing Threat Escalates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI-Powered Slopoly Malware Boosts Hive0163’s Ransomware Tactics
  • Rust-Based VENON Malware Targets Brazilian Banks
  • Critical SolarWinds Vulnerability Demands Immediate Action
  • North Korean Hackers Linked to Massive Polyfill Attack
  • Microsoft OAuth Device Phishing Threat Escalates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News