Page Loader
Summarize
This malware uses Windows features to steal your banking credentials
Coyote malware is targeting crypto wallet users

This malware uses Windows features to steal your banking credentials

Jul 23, 2025
03:30 pm

What's the story

Cybersecurity experts have discovered a new variant of the notorious Coyote malware, which uses a legitimate Windows feature to steal banking credentials. The threat was first detected by Akamai, a cybersecurity firm that specializes in preventing and mitigating cyber threats. The updated version of Coyote leverages Microsoft's UI Automation framework to identify cryptocurrency and exchange websites visited by users. This is part of its broader strategy to steal their wallets and banking information.

Malware tactics

Malware employs a range of techniques to steal banking information

The Coyote malware employs a range of techniques, including keylogging and phishing overlays, to steal banking information. It uses the Squirrel installer, a widely used tool for installing and updating Windows-based applications. The malware sends detailed information such as computer name, user name, system attributes, and details about the financial services used by the victim to its command-and-control center.

Targeting strategy

How the malware uses Windows API to target victims

The Coyote malware uses a Windows API called GetForegroundWindow() to take control of the active window and compare it with a hardcoded list of banking websites and cryptocurrency exchanges. If it doesn't find a target in the window title, it uses the Windows UI Automation service to get the web address and compare it with its list. This way, it can bypass most security tools that usually detect other types of malware.

Malware impact

Currently targeting Brazilian users

The Coyote malware variant is currently targeting Brazilian users. However, security researchers note that cybercriminals often test new malware in a specific region before deploying it globally. Akamai's security researchers have shared a proof-of-concept showing how the Windows feature can be exploited to steal login credentials entered on these websites. This case highlights how even helpful tech features can be misused for scams, stressing the need to stay vigilant about new threats.