home.social

#bankingtrojan — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #bankingtrojan, aggregated by home.social.

  1. TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook — Elastic Security Labs

    Pulse ID: 6a01c05dfa507c2e736c894e
    Pulse Link: otx.alienvault.com/pulse/6a01c
    Pulse Author: CyberHunter_NL
    Created: 2026-05-11 11:41:17

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Bank #BankingTrojan #Brazil #CyberSecurity #ElasticSecurityLabs #InfoSec #OTX #OpenThreatExchange #Outlook #Trojan #WhatsApp #bot #CyberHunter_NL

  2. New TrickMo Variant: Device Take Over malware targeting Banking, Fintech, Wallet & Auth apps

    A new variant of the TrickMo Android banking trojan was identified between January and February 2026, representing a substantial platform redesign rather than new capabilities. The malware has migrated its command-and-control infrastructure entirely onto The Open Network (TON) using .adnl endpoints, moving away from conventional internet infrastructure. Active campaigns have targeted banking and wallet users in France, Italy, and Austria. Once accessibility permissions are granted, operators gain real-time device control including credential phishing, keylogging, screen recording, SMS interception, and bidirectional remote control. New features include network reconnaissance capabilities and SSH tunnelling that transform infected devices into programmable network pivots and SOCKS5 proxy exit nodes, enabling operators to bypass IP-based fraud detection systems while accessing victim networks.

    Pulse ID: 6a019c5f0a3344d92c4302a3
    Pulse Link: otx.alienvault.com/pulse/6a019
    Pulse Author: AlienVault
    Created: 2026-05-11 09:07:43

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Android #Bank #BankingTrojan #CyberSecurity #Endpoint #France #InfoSec #Italy #Malware #OTX #OpenThreatExchange #Phishing #Proxy #RAT #RCE #SMS #SSH #Trojan #bot #socks5 #AlienVault

  3. New TrickMo Variant: Device Take Over malware targeting Banking, Fintech, Wallet & Auth apps

    A new variant of the TrickMo Android banking trojan was identified between January and February 2026, representing a substantial platform redesign rather than new capabilities. The malware has migrated its command-and-control infrastructure entirely onto The Open Network (TON) using .adnl endpoints, moving away from conventional internet infrastructure. Active campaigns have targeted banking and wallet users in France, Italy, and Austria. Once accessibility permissions are granted, operators gain real-time device control including credential phishing, keylogging, screen recording, SMS interception, and bidirectional remote control. New features include network reconnaissance capabilities and SSH tunnelling that transform infected devices into programmable network pivots and SOCKS5 proxy exit nodes, enabling operators to bypass IP-based fraud detection systems while accessing victim networks.

    Pulse ID: 6a019c5f0a3344d92c4302a3
    Pulse Link: otx.alienvault.com/pulse/6a019
    Pulse Author: AlienVault
    Created: 2026-05-11 09:07:43

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Android #Bank #BankingTrojan #CyberSecurity #Endpoint #France #InfoSec #Italy #Malware #OTX #OpenThreatExchange #Phishing #Proxy #RAT #RCE #SMS #SSH #Trojan #bot #socks5 #AlienVault

  4. New TrickMo Variant: Device Take Over malware targeting Banking, Fintech, Wallet & Auth apps

    A new variant of the TrickMo Android banking trojan was identified between January and February 2026, representing a substantial platform redesign rather than new capabilities. The malware has migrated its command-and-control infrastructure entirely onto The Open Network (TON) using .adnl endpoints, moving away from conventional internet infrastructure. Active campaigns have targeted banking and wallet users in France, Italy, and Austria. Once accessibility permissions are granted, operators gain real-time device control including credential phishing, keylogging, screen recording, SMS interception, and bidirectional remote control. New features include network reconnaissance capabilities and SSH tunnelling that transform infected devices into programmable network pivots and SOCKS5 proxy exit nodes, enabling operators to bypass IP-based fraud detection systems while accessing victim networks.

    Pulse ID: 6a019c5f0a3344d92c4302a3
    Pulse Link: otx.alienvault.com/pulse/6a019
    Pulse Author: AlienVault
    Created: 2026-05-11 09:07:43

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Android #Bank #BankingTrojan #CyberSecurity #Endpoint #France #InfoSec #Italy #Malware #OTX #OpenThreatExchange #Phishing #Proxy #RAT #RCE #SMS #SSH #Trojan #bot #socks5 #AlienVault

  5. New TrickMo Variant: Device Take Over malware targeting Banking, Fintech, Wallet & Auth apps

    A new variant of the TrickMo Android banking trojan was identified between January and February 2026, representing a substantial platform redesign rather than new capabilities. The malware has migrated its command-and-control infrastructure entirely onto The Open Network (TON) using .adnl endpoints, moving away from conventional internet infrastructure. Active campaigns have targeted banking and wallet users in France, Italy, and Austria. Once accessibility permissions are granted, operators gain real-time device control including credential phishing, keylogging, screen recording, SMS interception, and bidirectional remote control. New features include network reconnaissance capabilities and SSH tunnelling that transform infected devices into programmable network pivots and SOCKS5 proxy exit nodes, enabling operators to bypass IP-based fraud detection systems while accessing victim networks.

    Pulse ID: 6a019c5f0a3344d92c4302a3
    Pulse Link: otx.alienvault.com/pulse/6a019
    Pulse Author: AlienVault
    Created: 2026-05-11 09:07:43

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Android #Bank #BankingTrojan #CyberSecurity #Endpoint #France #InfoSec #Italy #Malware #OTX #OpenThreatExchange #Phishing #Proxy #RAT #RCE #SMS #SSH #Trojan #bot #socks5 #AlienVault

  6. New TrickMo Variant: Device Take Over malware targeting Banking, Fintech, Wallet & Auth apps

    A new variant of the TrickMo Android banking trojan was identified between January and February 2026, representing a substantial platform redesign rather than new capabilities. The malware has migrated its command-and-control infrastructure entirely onto The Open Network (TON) using .adnl endpoints, moving away from conventional internet infrastructure. Active campaigns have targeted banking and wallet users in France, Italy, and Austria. Once accessibility permissions are granted, operators gain real-time device control including credential phishing, keylogging, screen recording, SMS interception, and bidirectional remote control. New features include network reconnaissance capabilities and SSH tunnelling that transform infected devices into programmable network pivots and SOCKS5 proxy exit nodes, enabling operators to bypass IP-based fraud detection systems while accessing victim networks.

    Pulse ID: 6a019c5f0a3344d92c4302a3
    Pulse Link: otx.alienvault.com/pulse/6a019
    Pulse Author: AlienVault
    Created: 2026-05-11 09:07:43

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Android #Bank #BankingTrojan #CyberSecurity #Endpoint #France #InfoSec #Italy #Malware #OTX #OpenThreatExchange #Phishing #Proxy #RAT #RCE #SMS #SSH #Trojan #bot #socks5 #AlienVault

  7. TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook

    Pulse ID: 6a016000ee4c7bcaf4f232e3
    Pulse Link: otx.alienvault.com/pulse/6a016
    Pulse Author: Tr1sa111
    Created: 2026-05-11 04:50:08

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Bank #BankingTrojan #Brazil #CyberSecurity #InfoSec #OTX #OpenThreatExchange #Outlook #Trojan #WhatsApp #bot #Tr1sa111

  8. TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook

    A sophisticated Brazilian banking trojan named TCLBANKER has been identified, representing a significant evolution of the MAVERICK/SORVEPOTEL malware family. The campaign employs a trojanized Logitech installer that deploys two .NET Reactor-protected modules through DLL side-loading. The banking trojan monitors 59 Brazilian financial institutions using UI Automation and features a WPF-based full-screen overlay framework for operator-driven social engineering attacks, including credential harvesting and fake system screens. A secondary worm module enables self-propagation through WhatsApp session hijacking and Outlook COM automation, sending phishing messages from victims' own accounts. The malware implements robust anti-analysis capabilities including environment-gated payload decryption, comprehensive watchdog systems, and ETW patching. Infrastructure is hosted on Cloudflare Workers, with evidence suggesting the campaign was detected in early operational stages.

    Pulse ID: 69fb97e531a95b262c4925aa
    Pulse Link: otx.alienvault.com/pulse/69fb9
    Pulse Author: AlienVault
    Created: 2026-05-06 19:35:01

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Bank #BankingTrojan #Brazil #Cloud #CredentialHarvesting #CyberSecurity #ELF #InfoSec #Malware #NET #OTX #OpenThreatExchange #Outlook #Phishing #RAT #SocialEngineering #Trojan #WatchDog #WhatsApp #Worm #bot #AlienVault

  9. TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook

    A sophisticated Brazilian banking trojan named TCLBANKER has been identified, representing a significant evolution of the MAVERICK/SORVEPOTEL malware family. The campaign employs a trojanized Logitech installer that deploys two .NET Reactor-protected modules through DLL side-loading. The banking trojan monitors 59 Brazilian financial institutions using UI Automation and features a WPF-based full-screen overlay framework for operator-driven social engineering attacks, including credential harvesting and fake system screens. A secondary worm module enables self-propagation through WhatsApp session hijacking and Outlook COM automation, sending phishing messages from victims' own accounts. The malware implements robust anti-analysis capabilities including environment-gated payload decryption, comprehensive watchdog systems, and ETW patching. Infrastructure is hosted on Cloudflare Workers, with evidence suggesting the campaign was detected in early operational stages.

    Pulse ID: 69fb97e531a95b262c4925aa
    Pulse Link: otx.alienvault.com/pulse/69fb9
    Pulse Author: AlienVault
    Created: 2026-05-06 19:35:01

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Bank #BankingTrojan #Brazil #Cloud #CredentialHarvesting #CyberSecurity #ELF #InfoSec #Malware #NET #OTX #OpenThreatExchange #Outlook #Phishing #RAT #SocialEngineering #Trojan #WatchDog #WhatsApp #Worm #bot #AlienVault

  10. TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook

    A sophisticated Brazilian banking trojan named TCLBANKER has been identified, representing a significant evolution of the MAVERICK/SORVEPOTEL malware family. The campaign employs a trojanized Logitech installer that deploys two .NET Reactor-protected modules through DLL side-loading. The banking trojan monitors 59 Brazilian financial institutions using UI Automation and features a WPF-based full-screen overlay framework for operator-driven social engineering attacks, including credential harvesting and fake system screens. A secondary worm module enables self-propagation through WhatsApp session hijacking and Outlook COM automation, sending phishing messages from victims' own accounts. The malware implements robust anti-analysis capabilities including environment-gated payload decryption, comprehensive watchdog systems, and ETW patching. Infrastructure is hosted on Cloudflare Workers, with evidence suggesting the campaign was detected in early operational stages.

    Pulse ID: 69fb97e531a95b262c4925aa
    Pulse Link: otx.alienvault.com/pulse/69fb9
    Pulse Author: AlienVault
    Created: 2026-05-06 19:35:01

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Bank #BankingTrojan #Brazil #Cloud #CredentialHarvesting #CyberSecurity #ELF #InfoSec #Malware #NET #OTX #OpenThreatExchange #Outlook #Phishing #RAT #SocialEngineering #Trojan #WatchDog #WhatsApp #Worm #bot #AlienVault

  11. TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook

    A sophisticated Brazilian banking trojan named TCLBANKER has been identified, representing a significant evolution of the MAVERICK/SORVEPOTEL malware family. The campaign employs a trojanized Logitech installer that deploys two .NET Reactor-protected modules through DLL side-loading. The banking trojan monitors 59 Brazilian financial institutions using UI Automation and features a WPF-based full-screen overlay framework for operator-driven social engineering attacks, including credential harvesting and fake system screens. A secondary worm module enables self-propagation through WhatsApp session hijacking and Outlook COM automation, sending phishing messages from victims' own accounts. The malware implements robust anti-analysis capabilities including environment-gated payload decryption, comprehensive watchdog systems, and ETW patching. Infrastructure is hosted on Cloudflare Workers, with evidence suggesting the campaign was detected in early operational stages.

    Pulse ID: 69fb97e531a95b262c4925aa
    Pulse Link: otx.alienvault.com/pulse/69fb9
    Pulse Author: AlienVault
    Created: 2026-05-06 19:35:01

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Bank #BankingTrojan #Brazil #Cloud #CredentialHarvesting #CyberSecurity #ELF #InfoSec #Malware #NET #OTX #OpenThreatExchange #Outlook #Phishing #RAT #SocialEngineering #Trojan #WatchDog #WhatsApp #Worm #bot #AlienVault

  12. TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook

    A sophisticated Brazilian banking trojan named TCLBANKER has been identified, representing a significant evolution of the MAVERICK/SORVEPOTEL malware family. The campaign employs a trojanized Logitech installer that deploys two .NET Reactor-protected modules through DLL side-loading. The banking trojan monitors 59 Brazilian financial institutions using UI Automation and features a WPF-based full-screen overlay framework for operator-driven social engineering attacks, including credential harvesting and fake system screens. A secondary worm module enables self-propagation through WhatsApp session hijacking and Outlook COM automation, sending phishing messages from victims' own accounts. The malware implements robust anti-analysis capabilities including environment-gated payload decryption, comprehensive watchdog systems, and ETW patching. Infrastructure is hosted on Cloudflare Workers, with evidence suggesting the campaign was detected in early operational stages.

    Pulse ID: 69fb97e531a95b262c4925aa
    Pulse Link: otx.alienvault.com/pulse/69fb9
    Pulse Author: AlienVault
    Created: 2026-05-06 19:35:01

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Bank #BankingTrojan #Brazil #Cloud #CredentialHarvesting #CyberSecurity #ELF #InfoSec #Malware #NET #OTX #OpenThreatExchange #Outlook #Phishing #RAT #SocialEngineering #Trojan #WatchDog #WhatsApp #Worm #bot #AlienVault

  13. JanelaRAT an Advanced Banking Trojan Targeting Financial Users

    JanelaRAT is an evolving Remote Access Trojan targeting financial users in Latin America using multi stage infection chains, phishing and DLL sideloading to steal banking and cryptocurrency data while employing evasion, persistence and interactive techniques to bypass security controls.

    Pulse ID: 69e48460c771926e0e7231bc
    Pulse Link: otx.alienvault.com/pulse/69e48
    Pulse Author: cryptocti
    Created: 2026-04-19 07:29:36

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Bank #BankingTrojan #CyberSecurity #InfoSec #LatinAmerica #OTX #OpenThreatExchange #Phishing #RAT #RemoteAccessTrojan #SideLoading #Trojan #bot #cryptocurrency #cryptocti

  14. 🚨 Alert: The new #EternidadeStealer is using WhatsApp to spread malicious files to steal banking and crypto data from users. Watch out and don’t open unexpected attachments, plus verify messages from contacts.

    Read: hackread.com/eternidade-steale

    #CyberSecurity #Malware #WhatsApp #BankingTrojan #InfoSec

  15. Morphisec reports the expansion of URSA (Mispadu) banking trojan beyond Latin American countries and Spanish-speaking individuals. They describe the infection chain: delivery and multi-stage VB Scripts, and injector DLL. They also describe the payload features. IOC provided. 🔗 blog.morphisec.com/mispadu-inf

    #URSA #Mispadu #bankingtrojan #trojan #threatintel #cybercrime #IOC

  16. Morphisec reports the expansion of URSA (Mispadu) banking trojan beyond Latin American countries and Spanish-speaking individuals. They describe the infection chain: delivery and multi-stage VB Scripts, and injector DLL. They also describe the payload features. IOC provided. 🔗 blog.morphisec.com/mispadu-inf

    #URSA #Mispadu #bankingtrojan #trojan #threatintel #cybercrime #IOC

  17. Morphisec reports the expansion of URSA (Mispadu) banking trojan beyond Latin American countries and Spanish-speaking individuals. They describe the infection chain: delivery and multi-stage VB Scripts, and injector DLL. They also describe the payload features. IOC provided. 🔗 blog.morphisec.com/mispadu-inf

    #URSA #Mispadu #bankingtrojan #trojan #threatintel #cybercrime #IOC

  18. Morphisec reports the expansion of URSA (Mispadu) banking trojan beyond Latin American countries and Spanish-speaking individuals. They describe the infection chain: delivery and multi-stage VB Scripts, and injector DLL. They also describe the payload features. IOC provided. 🔗 blog.morphisec.com/mispadu-inf

    #URSA #Mispadu #bankingtrojan #trojan #threatintel #cybercrime #IOC

  19. Morphisec reports the expansion of URSA (Mispadu) banking trojan beyond Latin American countries and Spanish-speaking individuals. They describe the infection chain: delivery and multi-stage VB Scripts, and injector DLL. They also describe the payload features. IOC provided. 🔗 blog.morphisec.com/mispadu-inf

    #URSA #Mispadu #bankingtrojan #trojan #threatintel #cybercrime #IOC

  20. LATAM Malware Variants - 2023 Technical Updates

    In 2023, several well-known Latin America banking trojans and information stealers like Mispadu, Kiron, Caiman, Culebra, Salve and Astaroth were updated with new components and obfuscation methods focused on improving defense evasion capabilities. The updates included new droppers, CAPTCHA implementations, payload encryption schemes and dead drop techniques.

    Pulse ID: 65dc68a137d255fac0150a01
    Pulse Link: otx.alienvault.com/pulse/65dc6
    Pulse Author: AlienVault
    Created: 2024-02-26 10:32:01

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #OTX #OpenThreatExchange #InfoSec #bot #CyberSecurity #Malware #Bank #Trojan #Encryption #BankingTrojan #LatinAmerica #Mispadu #AlienVault