Coyote Becomes First Malware to Exploit Windows UI Automation for Banking Credential Theft


Coyote Becomes First Malware to Exploit Windows UI Automation for Banking Credential Theft

The Windows-based banking trojan Coyote has become the first known malware to abuse the Windows UI Automation (UIA) framework to steal sensitive financial data, according to new findings from Akamai Security Labs. The latest variant is primarily targeting Brazilian users, aiming to extract login credentials tied to 75 banking websites and cryptocurrency exchanges.

“The new Coyote variant is targeting Brazilian users, and uses UIA to extract credentials linked to 75 banking institutes’ web addresses and cryptocurrency exchanges,” said Akamai researcher Tomer Peled in a detailed analysis.

Coyote, which first surfaced in 2024 as reported by Kaspersky, is already known for a range of capabilities such as keylogging, screen capture, and displaying fraudulent overlays on login portals of financial platforms. Its latest development leverages the UI Automation framework—a legitimate accessibility feature in Microsoft’s .NET Framework—to interact with and parse user interface elements of other applications.

The abuse of UIA for malicious purposes was originally demonstrated as a proof-of-concept by Akamai in December 2024, which warned that the framework could be manipulated to steal credentials or even execute arbitrary code. While similar methods have been observed in Android banking trojans that misuse accessibility services, this marks a significant evolution for Windows-based threats.

The malware uses the GetForegroundWindow() API to determine the active window and checks the window title against a hard-coded list of known financial and crypto-related URLs. “If no match is found Coyote will then use UIA to parse through the UI child elements of the window in an attempt to identify browser tabs or address bars,” Peled explained. “The content of these UI elements will then be cross-referenced with the same list of addresses from the first comparison.”

“Without UIA, parsing the sub-elements of another application is a nontrivial task,” Akamai added. “To be able to effectively read the contents of sub-elements within another application, a developer would need to have a very good understanding of how the specific target application is structured.”

Akamai also noted that Coyote functions in both online and offline modes, increasing its ability to detect targeted platforms and harvest credentials regardless of internet connectivity. With the number of targeted institutions now at 75, up from 73 reported by Fortinet earlier this year, the malware continues to evolve in both scope and sophistication.

 

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch