Skip to content

Akamai Warns of New Coyote Malware Exploiting Microsoft's UI Automation

Coyote malware sets a new precedent, exploiting Microsoft's UI Automation to target user input fields. Akamai warns administrators to stay vigilant.

This is a picture of a screen , where there are some icons , and there is a popup message on it.
This is a picture of a screen , where there are some icons , and there is a popup message on it.

Akamai Warns of New Coyote Malware Exploiting Microsoft's UI Automation

Akamai, a leading content delivery network, has reported the first instance of wild use of UI automation exploitation by the Coyote malware, detected in February 2024. This marks a new era in cyber threats, with malware authors rapidly adopting Microsoft's UI Automation for novel attack methods.

The Coyote malware, first of its kind, exploits Microsoft's UI Automation framework to dig into UI elements and extract hidden web addresses. This technique allows the malware to bypass traditional security measures and steal sensitive data, including financial credentials. Akamai discovered this abuse and warned administrators to monitor for unknown processes loading UI Automation and specific named pipes to detect such abuses.

Targeting Brazilian users across 75 banks and crypto platforms, Coyote malware has caused significant concern. Its ability to target UI elements makes it a formidable threat, as it can bypass security measures designed to protect user input fields.

The discovery of Coyote malware's UI automation exploitation by Akamai serves as a wake-up call for administrators and cybersecurity professionals. As malware authors continue to adopt new methods, it is crucial to stay vigilant and adapt security measures to counter emerging threats.

Read also:

Latest