• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
experts warn of mekotio banking trojan targeting latin american countries

Experts Warn of Mekotio Banking Trojan Targeting Latin American Countries

You are here: Home / General Cyber Security News / Experts Warn of Mekotio Banking Trojan Targeting Latin American Countries
July 8, 2024

Fiscal institutions in Latin The united states are getting threatened by a banking trojan referred to as Mekotio (aka Melcoz).

That’s according to conclusions from Pattern Micro, which reported it not too long ago noticed a surge in cyber attacks distributing the Windows malware.

Mekotio, acknowledged to be actively put to use considering the fact that 2015, is recognised to focus on Latin American nations like Brazil, Chile, Mexico, Spain, Peru, and Portugal with an goal to steal banking credentials.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Initially documented by ESET in August 2020, it is really component of a tetrade of banking trojans concentrating on the location Guildma, Javali, and Grandoreiro, the latter of which was dismantled by law enforcement earlier this yr.

Cybersecurity

“Mekotio shares common qualities for this variety of malware, this sort of as being prepared in Delphi, utilizing faux pop-up windows, made up of backdoor operation and targeting Spanish- and Portuguese-talking international locations,” the Slovakian cybersecurity company claimed at the time.

The malware operation suffered a blow in July 2021 when Spanish regulation enforcement businesses arrested 16 individuals belonging to a felony network in relationship with orchestrating social engineering strategies targeting European customers that sent Grandoreiro and Mekotio.

Attack chains contain the use of tax-themed phishing e-mails that intention to trick recipients into opening destructive attachments or clicking on bogus hyperlinks that lead to the deployment of an MSI installer file, which, in switch, helps make use of an AutoHotKey (AHK) script to start the malware.

It’s worth noting that the an infection process marks a slight deviation from the one particular earlier in depth by Check out Issue in November 2021, which made use of an obfuscated batch script that operates a PowerShell script to obtain a next-stage ZIP file containing the AHK script.

As soon as installed, Mekotio harvests process information and establishes make contact with with a command-and-regulate (C2) server to receive even more guidance.

It’s key goal is to siphon banking credentials by exhibiting phony pop-ups that impersonate authentic banking web sites. It can also seize screenshots, log keystrokes, steal clipboard knowledge, and create persistence on the host making use of scheduled responsibilities.

Cybersecurity

The stolen details can then be made use of by the menace actors to get unauthorized access to users’ lender accounts and conduct fraudulent transactions.

“The Mekotio banking trojan is a persistent and evolving threat to fiscal methods, specifically in Latin American international locations,” Craze Micro said. “It works by using phishing email messages to infiltrate methods, with the target of stealing delicate information even though also keeping a solid foothold on compromised devices.”

The development comes as Mexican cybersecurity firm Scitum disclosed information of a new Latin American banking trojan codenamed Purple Mongoose Daemon that, comparable to Mekotio, utilizes MSI droppers distributed via phishing e-mails masquerading as invoices and tax notes.

“The main objective of Purple Mongoose Daemon is to steal victims’ banking data by spoofing PIX transactions by way of overlapping windows,” the corporation mentioned. “This trojan is aimed at Brazilian close consumers and personnel of organizations with banking information.”

“Red Mongoose Daemon has capabilities for manipulating and developing windows, executing instructions, managing the laptop remotely, manipulating web browsers, hijacking clipboards, and impersonating Bitcoin wallets by changing copied wallets with the ones employed by cybercriminals.”

Discovered this short article interesting? Comply with us on Twitter  and LinkedIn to examine a lot more special material we write-up.


Some elements of this write-up are sourced from:
thehackernews.com

Previous Post: «critical unpatched flaws disclosed in popular gogs open source git service Critical Unpatched Flaws Disclosed in Popular Gogs Open-Source Git Service
Next Post: 5 Key Questions CISOs Must Ask Themselves About Their Cybersecurity Strategy 5 key questions cisos must ask themselves about their cybersecurity»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.