Rust VENON Malware Targets Brazilian Banking Apps

New Rust banking Trojan VENON targets Brazil, uses AI and hijacks shortcuts to steal credentials.

  • A new Rust-based banking Trojan named VENON is targeting Brazilian users, departing from the region’s typical Delphi-based malware.
  • The malware is sophisticated, using nine evasion techniques and shortcut hijacking to steal credentials from 33 financial and crypto platforms.
  • The code suggests the developer used generative AI to translate known banking Trojan capabilities into the Rust language.
  • Its discovery coincides with a separate WhatsApp-based worm campaign distributing other banking malware like Astaroth in Brazil.

Brazilian cybersecurity firm ZenoX revealed in March 2026 that a new Windows banking Trojan, codenamed VENON, has emerged, written in the Rust programming language. This discovery marks a significant shift from the Delphi-based malware families traditionally linked to Latin American cybercrime.

- Advertisement -

The malware first appeared last month and shares key behaviors with established regional Trojans like Grandoreiro. VENON features banking overlay logic, active window monitoring, and a mechanism for hijacking system shortcuts.

ZenoX said the Rust code structure suggests a developer familiar with existing threats possibly used generative AI to rewrite functionalities. The campaign is suspected to use social engineering lures, like ClickFix, to deliver its payload via a multi-stage PowerShell infection chain.

VENON employs nine sophisticated evasion techniques before activating. It then retrieves a configuration from a Google Cloud Storage URL and establishes a WebSocket connection to its command server.

Its hijacking mechanism specifically targets Brazil’s Itaú banking application by replacing legitimate shortcuts. Consequently, this redirects victims to attacker-controlled pages designed for credential theft.

- Advertisement -

The malware monitors for 33 targeted financial institutions and digital asset platforms. It springs into action only when a victim accesses one of these services, deploying fake overlays to capture login data.

Meanwhile, a separate but related threat exploits the ubiquity of WhatsApp in Brazil. A worm named SORVEPOTEL is delivered via the platform’s desktop web version, as detailed by Blackpoint Cyber.

Blackpoint Cyber said a single hijacked WhatsApp message could draw victims into a chain deploying malware like Astaroth. This combination of local automation and permissive environments allowed the threats to establish themselves with minimal friction.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

STRC Sales Surge, Eye Record Single-Day Bitcoin Buy

A community dashboard tracking Strategy's STRC sales suggests March 12, 2026 could see the...

SEC’s Peirce Urges Simpler Rules Amid Tokenization Talks

SEC Commissioner Hester Peirce argues regulators should avoid micromanaging markets and consider simplifying disclosure...

Ethereum Holds $2K Amid ETF Inflows, Gains Across Timeframes

Ethereum (ETH) is holding above $2,000 despite a volatile market, showing gains across most...

OP Labs Lays Off 20 Staff as Optimism Focus Narrows

OP Labs, the core developer behind the Ethereum layer-2 Optimism network, has laid off...

Omnichain USDT Launched on Hedera for Seamless Liquidity

USDT0, the omnichain version of Tether's USDT stablecoin, has launched on the Hedera network.The...

Must Read

17 Best Audiobooks On Blockchain Technology For Beginners

If you're looking to dive into the world of blockchain technology, you're in for a treat. The field is rapidly evolving and the potential...