Coyote Banking Trojan Exploits Windows UI Automation for Theft

Coyote Banking Trojan Exploits Windows UI Automation to Target Brazilian Financial and Crypto Credentials

  • The Coyote banking trojan is the first Malware known to exploit Windows UI Automation to steal sensitive information.
  • This new variant targets Brazilian users and focuses on credentials from 75 banks and cryptocurrency exchanges.
  • UI Automation, a feature in Microsoft .NET, is used by assistive tools to access desktop interface elements.
  • Akamai researchers found the malware’s tactics are similar to Android banking trojans that use accessibility features.
  • Coyote’s latest update allows data theft to occur both online or offline, increasing its effectiveness.

A new version of the Coyote banking trojan is using a Windows feature called UI Automation to steal user details, according to research published by Akamai on July 23, 2025. The trojan is currently targeting people in Brazil and is able to collect credentials from 75 different financial institutions and cryptocurrency exchanges.

- Advertisement -

Tomer Peled, a security researcher at Akamai, reported that Coyote leverages UI Automation (UIA), a Microsoft .NET Framework component meant to help assistive technology like screen readers. The malware was first revealed by Kaspersky in 2024 and is known for logging keystrokes, taking screenshots, and placing fake login screens over legitimate banking and financial sites.

According to the analysis, UI Automation is designed to allow tools to access user interface elements on the desktop. An earlier proof-of-concept by Akamai showed that this feature could be misused to capture confidential data or run unauthorized code. “The new Coyote variant is targeting Brazilian users, and uses UIA to extract credentials linked to 75 banking institutes’ web addresses and cryptocurrency exchanges,” Peled said in the analysis.

The malware compares the title of the open window with a list of targeted banks and exchanges. If it does not find a match, it uses UI Automation to scan through UI elements like browser tabs or address bars looking for these institutions. The contents found are checked against its hard-coded list of targets. “Without UIA, parsing the sub-elements of another application is a nontrivial task,” Akamai noted.

UI Automation’s official purpose is to provide access to window elements for tools that assist users with disabilities, but Coyote has turned this legitimate feature into a data theft channel. Akamai explained that Coyote can search for bank information both with and without an internet connection, which helps it gather credentials more reliably.

- Advertisement -

Earlier reviews by Fortinet FortiGuard Labs documented Coyote targeting 73 financial institutions, but the latest version now affects 75. This change demonstrates the malware’s continuous development and growing range.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Pi Coin Bucks Bearish Trend With 4% Daily Surge

Pi Network's PI token rallied nearly 4% in a day, outperforming major cryptocurrencies.The uptick...

Wall Street Cuts Coinbase Targets After Q4 Results

Coinbase shares rose over 6% in pre-market trading despite multiple Wall Street analysts cutting...

Musk Slams Anthropic AI as ‘Evil’ as Exits Hit xAI

Anthropic has raised $30 billion in Series G funding at a staggering $380 billion...

Hong Kong to Grant First Cryptocurrency Licenses in March 2026

The Hong Kong Monetary Authority (HKMA) aims to issue its first crypto licenses by...

Trump-Backed Firm Aims to Rival Ripple in Forex Market

World Liberty Financial, backed by the Trump family, announces its entry into the foreign...

Must Read

Top 7 BEST Crypto Trading Bots for Beginners

QUICK NAVIGATIONQuick Look: Top 3 Best Crypto Trading BotsWhat Exactly is a Crypto Trading Bot?How I Chose These Trading BotsTop 7 Crypto Trading Bots...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!