• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new coyote trojan targets 61 brazilian banks with nim powered attack

New Coyote Trojan Targets 61 Brazilian Banks with Nim-Powered Attack

You are here: Home / General Cyber Security News / New Coyote Trojan Targets 61 Brazilian Banks with Nim-Powered Attack
February 9, 2024

Sixty-a person banking institutions, all of them originating from Brazil, are the focus on of a new banking trojan known as Coyote.

“This malware utilizes the Squirrel installer for distribution, leveraging Node.js and a relatively new multi-platform programming language named Nim as a loader to complete its infection,” Russian cybersecurity business Kaspersky stated in a Thursday report.

What makes Coyote a distinctive breed from other banking trojans of its type is the use of the open-supply Squirrel framework for setting up and updating Windows apps. One more noteworthy departure is the change from Delphi – which is common amongst banking malware households targeting Latin America – to uncommon programming languages like Nim.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

In the attack chain documented by Kaspersky, a Squirrel installer executable is used as a launchpad for a Node.js application compiled with Electron, which, in transform, runs a Nim-based loader to set off the execution of the destructive Coyote payload by implies of DLL aspect-loading.

The malicious dynamic-website link library, named “libcef.dll,” is aspect-loaded by suggests of a legit executable named “obs-browser-page.exe,” which is also bundled in the Node.js venture. It really is value noting that the first libcef.dll is portion of the Chromium Embedded Framework (CEF).

Coyote, after executed, “monitors all open purposes on the victim’s procedure and waits for the certain banking software or website to be accessed,” subsequently contacting an actor-managed server to fetch subsequent-stage directives.

Coyote Banking Trojan

It has the ability to execute a large assortment of commands to get screenshots, log keystrokes, terminate processes, display screen faux overlays, shift the mouse cursor to a distinct place, and even shut down the device. It can also outright block the device with a bogus “Working on updates…” concept whilst executing malicious steps in the history.

“The addition of Nim as a loader provides complexity to the trojan’s design and style,” Kaspersky stated. “This evolution highlights the raising sophistication within just the threat landscape and shows how risk actors are adapting and making use of the most recent languages and tools in their destructive strategies.”

Cybersecurity

The advancement arrives as Brazilian regulation enforcement authorities dismantled the Grandoreiro operation and issued five non permanent arrest warrants and 13 research and seizure warrants for the masterminds driving the malware across five Brazilian states.

It also follows the discovery of a new Python-centered facts stealer which is similar to the Vietnamese architects involved with MrTonyScam and distributed through booby-trapped Microsoft Excel and Term documents.

The stealer “collects browsers’ cookies and login information […] from a huge array of browsers, from common browsers these as Chrome and Edge to browsers concentrated on the area current market, like the Cốc Cốc browser,” Fortinet FortiGuard Labs mentioned in a report printed this week.

Discovered this short article appealing? Follow us on Twitter  and LinkedIn to read additional unique information we article.


Some components of this posting are sourced from:
thehackernews.com

Previous Post: «wazuh in the cloud era: navigating the challenges of cybersecurity Wazuh in the Cloud Era: Navigating the Challenges of Cybersecurity
Next Post: Hands-on Review: Myrror Security Code-Aware and Attack-Aware SCA hands on review: myrror security code aware and attack aware sca»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.