www.rivitmedia.comwww.rivitmedia.comwww.rivitmedia.com
  • Home
  • Tech News
    Tech NewsShow More
    Malicious Go Modules Unleash Disk-Wiping Chaos in Linux Supply Chain Attack
    4 Min Read
    Agentic AI: Transforming Cybersecurity in 2025
    3 Min Read
    Cybersecurity CEO Accused of Planting Malware in Hospital Systems: A Breach of Trust That Shocks the Industry
    6 Min Read
    Cloud Convenience, Criminal Opportunity: How Google Sites Became a Launchpad for Elite Phishing
    6 Min Read
    Targeted Exploits Highlight Need for Vigilance Among High-Risk Apple Users
    4 Min Read
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
  • FREE SCAN
  • Cybersecurity for Business
Search
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 rivitMedia.com. All Rights Reserved.
Reading: Coyote Banking Trojan: A Growing Threat to Online Banking Security in Brazil
Share
Notification Show More
Font ResizerAa
www.rivitmedia.comwww.rivitmedia.com
Font ResizerAa
  • Online Scams
  • Tech News
  • Cyber Threats
  • Mac Malware
  • Cybersecurity for Business
  • FREE SCAN
Search
  • Home
  • Tech News
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
    • Cybersecurity for Business
  • FREE SCAN
  • Sitemap
Follow US
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
www.rivitmedia.com > Blog > Cyber Threats > Malware > Coyote Banking Trojan: A Growing Threat to Online Banking Security in Brazil
MalwareTrojans

Coyote Banking Trojan: A Growing Threat to Online Banking Security in Brazil

riviTMedia Research
Last updated: February 4, 2025 1:08 am
riviTMedia Research
Share
Coyote Banking Trojan: A Growing Threat to Online Banking Security in Brazil
SHARE

Cybersecurity experts at FortiGuard Labs have identified a series of malicious Windows Shortcut (LNK) files that serve as the initial infection vector for the Coyote Banking Trojan. This sophisticated malware is designed to steal sensitive financial information, primarily targeting online banking users in Brazil. The Coyote Trojan is a clear indication that cybercriminals are continuously evolving their tactics to bypass security measures and compromise banking institutions.

Contents
How Does Coyote Banking Trojan Work?Summary of the Coyote Banking TrojanDownload SpyHunter Now & Scan Your Computer For Free!Coyote Banking Trojan’s Target ListBrazilian Financial PlatformsHospitality-Related WebsitesHow to Remove Coyote Banking Trojan?Download SpyHunter Now & Scan Your Computer For Free!Step 1: Disconnect from the InternetStep 2: Boot into Safe ModeStep 3: Use SpyHunter to Remove the MalwareStep 4: Restore System IntegrityPreventive Measures: How to Avoid Future Infections1. Be Cautious with Email Attachments2. Disable Windows LNK File Execution3. Use Strong Security Software4. Keep Your Software Updated5. Enable Two-Factor Authentication (2FA)6. Monitor Your Bank Statements RegularlyConclusionDownload SpyHunter Now & Scan Your Computer For Free!

How Does Coyote Banking Trojan Work?

The Coyote Trojan follows a multi-stage infection process, making it particularly stealthy and difficult to detect. Below is a breakdown of its operation:

  1. Execution of Malicious LNK File:
    The attack begins when a user unknowingly executes a Windows LNK shortcut file, which contains PowerShell commands designed to download the next stage of the malware.
  2. PowerShell Commands Retrieve Malware:
    The PowerShell script connects to a remote attacker-controlled server, retrieving an additional malicious PowerShell script.
  3. Deployment of a Malware Loader:
    The second-stage script downloads a loader that executes the primary malware payload. This ensures that Coyote gains a foothold on the infected system.
  4. Use of Donut to Evade Detection:
    The malware utilizes Donut, a well-known tool used to decrypt and execute Microsoft Intermediate Language (MSIL) payloads. This step allows the Trojan to execute its malicious code in an obfuscated manner.
  5. Modification of Windows Registry for Persistence:
    To ensure that the malware remains active even after a system restart, it modifies the Windows registry settings to maintain persistence.
  6. Stealing User Credentials and Financial Data:
    Once installed, Coyote performs a variety of malicious activities, including:
    • Logging keystrokes to capture usernames, passwords, and banking details.
    • Taking screenshots of the victim’s screen.
    • Displaying phishing overlays on legitimate banking websites.
    • Manipulating system display settings to deceive the victim.
  7. Communication with Command-and-Control Server:
    The Trojan connects to its Command-and-Control (C2) server, sending stolen data and receiving further instructions.
  8. Avoiding Detection:
    Coyote actively checks whether it is running in a virtual or sandboxed environment, preventing cybersecurity researchers from analyzing its behavior.

Summary of the Coyote Banking Trojan

The following table summarizes key details of the Coyote Banking Trojan:

AttributeDetails
Threat TypeBanking Trojan, Financial Malware
Detection NamesTrojan:Win32/Coyote.A, HEUR:Trojan-Banker.Win32.Coyote, Trojan:MSIL/Coyote.B
Symptoms of InfectionSlow computer performance, suspicious PowerShell activity, missing funds from online banking accounts, unauthorized transactions, phishing overlays on banking websites
DamageTheft of banking credentials, unauthorized financial transactions, identity theft, possible financial ruin
Distribution MethodsMalicious Windows LNK files, email phishing campaigns, compromised websites, infected downloads
Danger LevelHigh – sophisticated attack targeting financial institutions

Download SpyHunter Now & Scan Your Computer For Free!

Remove this and any other malicious threats to your system by scanning your computer with SpyHunter now! It’s FREE!

Download SpyHunter Now

Coyote Banking Trojan’s Target List

Initially, Coyote targeted around 70 financial applications, but its scope has expanded to over 1,000 websites and 73 financial institutions. Some of the key targets include:

Brazilian Financial Platforms

  • mercadobitcoin.com.br
  • bitcointrade.com.br
  • foxbit.com.br

Hospitality-Related Websites

  • augustoshotel.com.br
  • blumenhotelboutique.com.br
  • fallshotel.com.br

When a victim accesses one of these targeted sites, the malware contacts a remote server, which then instructs the Trojan to:

  • Log keystrokes
  • Capture screenshots
  • Display phishing overlays
  • Steal login credentials

The rapid expansion of Coyote’s target list suggests that cybercriminals are actively developing the Trojan, making it a persistent and evolving threat.


How to Remove Coyote Banking Trojan?

Download SpyHunter Now & Scan Your Computer For Free!

Remove this and any other malicious threats to your system by scanning your computer with SpyHunter now! It’s FREE!

Download SpyHunter Now

If you suspect that your system is infected with Coyote, immediate action is required to minimize damage.

Step 1: Disconnect from the Internet

  • Disable your Wi-Fi or unplug your Ethernet cable to prevent further communication with the attacker’s server.

Step 2: Boot into Safe Mode

  1. Restart your computer and press F8 or Shift + F8 before Windows boots.
  2. Select Safe Mode with Networking to load only essential services.

Step 3: Use SpyHunter to Remove the Malware

SpyHunter is an advanced anti-malware tool that can detect and remove the Coyote Banking Trojan.

  1. Download SpyHunter.
  2. Install the program and run a full system scan.
  3. Allow SpyHunter to identify and remove all malicious files and registry entries.
  4. Restart your computer and re-scan your system to ensure complete removal.
Download SpyHunter Now

Step 4: Restore System Integrity

  • Open Windows Registry Editor (regedit) and check for suspicious modifications.
  • Navigate to Task Scheduler (taskschd.msc) and remove unknown scheduled tasks.
  • Run Windows Defender Offline Scan for an additional layer of security.

Preventive Measures: How to Avoid Future Infections

To protect yourself from banking Trojans like Coyote, follow these security best practices:

1. Be Cautious with Email Attachments

  • Avoid clicking on unknown links or downloading attachments from suspicious emails.
  • Cybercriminals disguise malware as legitimate files, making email phishing a common infection method.

2. Disable Windows LNK File Execution

  • Since Coyote spreads via LNK shortcut files, disabling their execution can significantly reduce risk.
  • Open Group Policy Editor (gpedit.msc) and navigate to:
    User Configuration > Administrative Templates > Windows Components > File Explorer
  • Enable “Turn off shortcut (.lnk) file tracking”.

3. Use Strong Security Software

  • Install SpyHunter or a reputable anti-malware solution to detect and remove threats in real time.
  • Keep Windows Defender enabled and updated.

4. Keep Your Software Updated

  • Update Windows, browsers, and security software regularly to fix vulnerabilities that malware exploits.

5. Enable Two-Factor Authentication (2FA)

  • If a cybercriminal steals your banking credentials, 2FA provides an extra security layer to prevent unauthorized access.

6. Monitor Your Bank Statements Regularly

  • If you notice unauthorized transactions, contact your bank immediately.

Conclusion

The Coyote Banking Trojan is a serious cybersecurity threat that has expanded its reach, targeting both financial institutions and unsuspecting users. Its stealthy infection process, ability to evade detection, and advanced data-stealing capabilities make it a significant danger.

By following best security practices and using SpyHunter for malware removal, users can effectively detect, remove, and prevent Coyote Trojan infections. Awareness and proactive security measures remain key to staying safe in the ever-evolving world of cyber threats.

Download SpyHunter Now & Scan Your Computer For Free!

Remove this and any other malicious threats to your system by scanning your computer with SpyHunter now! It’s FREE!

Download SpyHunter Now

You Might Also Like

DenaliView Adware: A Closer Look at Online Threats
Win32/Pitou Trojan: Threat Analysis and Removal Guide
Endpoint Protection Platform vs Endpoint Detection and Response: Which is Best for Your Business?
Lockdown Ransomware: Understanding the Threat and How to Protect Yourself
MajorRecord Adware
TAGGED:anti-malware toolsbanking malwarebanking malware removalbanking security tipsbanking trojanbanking Trojan preventionBrazilian banking malwareCoyote Banking TrojanCoyote virus removalcryptocurrency malwarecyber threat detectioncybersecurity best practicesCybersecurity threatsfinancial cybercrimeFinancial fraud preventionfinancial malwarefinancial security threatskeyloggerkeylogger detectionkeylogger virusmalicious shortcut filesmalware infectionmalware protectionMalware removal guideonline banking securityonline fraudphishing overlayphishing overlay scamphishing trojanPowerShell malwareprevent banking malwareremove banking trojanSpyHunter Malware RemovalSpyHunter removal guideTrojan horse attackTrojan horse removaltrojan infectionTrojan persistenceWindows LNK malwareWindows LNK virus

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article Localswithsecrets.com Pop-up Ads Virus – How to Remove It and Stay Protected
Next Article FastFix Mac Adware Removal Guide – Protect Your Mac from PUP Threats
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Scan Your System for Free

✅ Free Scan Available 

✅ 13M Scans/Month

✅ Instant Detection

Download SpyHunter

//

Check in Daily for the best technology and Cybersecurity based content on the internet.

Quick Link

  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

© 2023 • rivitmedia.com All Rights Reserved.
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US