Coyote Banking Trojan Exploits Windows UI Automation for Theft

Coyote Banking Trojan Exploits Windows UI Automation to Target Brazilian Financial and Crypto Credentials

  • The Coyote banking trojan is the first Malware known to exploit Windows UI Automation to steal sensitive information.
  • This new variant targets Brazilian users and focuses on credentials from 75 banks and cryptocurrency exchanges.
  • UI Automation, a feature in Microsoft .NET, is used by assistive tools to access desktop interface elements.
  • Akamai researchers found the malware’s tactics are similar to Android banking trojans that use accessibility features.
  • Coyote’s latest update allows data theft to occur both online or offline, increasing its effectiveness.

A new version of the Coyote banking trojan is using a Windows feature called UI Automation to steal user details, according to research published by Akamai on July 23, 2025. The trojan is currently targeting people in Brazil and is able to collect credentials from 75 different financial institutions and cryptocurrency exchanges.

- Advertisement -

Tomer Peled, a security researcher at Akamai, reported that Coyote leverages UI Automation (UIA), a Microsoft .NET Framework component meant to help assistive technology like screen readers. The malware was first revealed by Kaspersky in 2024 and is known for logging keystrokes, taking screenshots, and placing fake login screens over legitimate banking and financial sites.

According to the analysis, UI Automation is designed to allow tools to access user interface elements on the desktop. An earlier proof-of-concept by Akamai showed that this feature could be misused to capture confidential data or run unauthorized code. “The new Coyote variant is targeting Brazilian users, and uses UIA to extract credentials linked to 75 banking institutes’ web addresses and cryptocurrency exchanges,” Peled said in the analysis.

The malware compares the title of the open window with a list of targeted banks and exchanges. If it does not find a match, it uses UI Automation to scan through UI elements like browser tabs or address bars looking for these institutions. The contents found are checked against its hard-coded list of targets. “Without UIA, parsing the sub-elements of another application is a nontrivial task,” Akamai noted.

UI Automation’s official purpose is to provide access to window elements for tools that assist users with disabilities, but Coyote has turned this legitimate feature into a data theft channel. Akamai explained that Coyote can search for bank information both with and without an internet connection, which helps it gather credentials more reliably.

Earlier reviews by Fortinet FortiGuard Labs documented Coyote targeting 73 financial institutions, but the latest version now affects 75. This change demonstrates the malware’s continuous development and growing range.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

WisdomTree Reveals USDW Stablecoin Plans, Expands Crypto Offerings

WisdomTree revealed details of its stablecoin approach and made public its Stellar-based stablecoin, USDW.USDW,...

Dignitas Unveils ‘Digi’ AI Agent for Esports, Powered by Theta Network

Dignitas is partnering with THETA Network to introduce “Digi,” an Artificial Intelligence assistant for...

Bitcoin Treasury Firms Sink: Median Stock Down 52% From 2025 Highs

Bitcoin treasury companies launched in 2025 are seeing significant declines in stock value. All 43...

Draper: Bitcoin’s Tech Pulls Crypto Innovation, Fiat Faces Extinction

Bitcoin offers an alternative for nearly 20% of unbanked adults globally, allowing them to...

Ethereum Whale Withdrawals Trigger Aave Liquidity Crunch, Rates Soar

Large investors withdrew $1.7 billion in Ethereum from Aave in the past week.The sudden...

Must Read

Top 5 Testing Tools For Blockchain Applications in 2022

Blockchain apps have been adopted popularly by some prominent industries due to its being a decentralized-designed technology. Furthermore, these apps eliminate the risks that...