ThreatCluster
  • Feed
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

Coyote Malware Targets WILS, Abusing Microsoft UI Automation to Exfiltrate Logins

Threat Score:
48
GB Hackers
2 days ago
Part of cluster #1315

Overview

Coyote Malware Targets WILS, Abusing Microsoft UI Automation to Exfiltrate Logins Akamai security researchers have uncovered a novel variant of the Coyote banking trojan that marks the inaugural documented instance of malicious actors exploiting Microsoft’s UI Automation (UIA) framework in real-world attacks. Initially detailed in a December 2024 Akamai blog post as a proof-of-concept vulnerability, UIA originally designed for accessibility features in Windows operating systems from XP onward en...

Continue Reading on Original Site

Related Articles

5 articles
1

Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide

Cybersecurity News • 6 hours ago

Microsoft is currently facing an outage that affects the Microsoft 365 Admin Center, preventing administrators from accessing essential management tools. The issue, which emerged prominently on July 24, 2025, has persisted into the following day, marking the second such incident this week and raising concerns service reliability. As businesses rely heavily on Microsoft 365 […]

Score
78
Read more
2
Microsoft SharePoint Hackers Switch Gears to Spread Ransomware

Microsoft SharePoint Hackers Switch Gears to Spread Ransomware

TechRepublic Security • 3 hours ago

Recent attacks targeting Microsoft SharePoint have escalated, with threat actors now deploying ransomware on vulnerable systems, according to Microsoft. This surge in malicious activity follows the release of multiple SharePoint security patches in July. Anupdate published to Microsoft’s blogreads, in part: “Expanded analysis and threat intelligence from our continued monitoring of exploitation activity by Storm-2603 leading to the deployment of Warlock ransomware.” Detailing the attack At least

Score
76
Read more
3
Global ransomware attacks drop 43% but threats evolve quickly

Global ransomware attacks drop 43% but threats evolve quickly

Security Brief UK • 6 hours ago

Global ransomware attacks drop 43% but threats evolve quickly Ransomware attacks worldwide declined by 43% in the second quarter, yet threats continue to adapt and evolve according to a new report from NCC Group. The report found a notable decrease in global ransomware activity, with incidents dropping by six percent month-on-month in June, amounting to 371 cases. Over the quarter, attacks fell by 1180 cases compared with the quarter. Experts attribute the reduction to seasonal slowdowns, includ

Score
75
Read more
4
The Ηоmоgraph Illusion: Not Everything Is As It Seems

The Ηоmоgraph Illusion: Not Everything Is As It Seems

Palo Alto Unit 42 • 4 hours ago

Threat Research Center Threat Research The Ηоmоgraph Illusion: Not Everything Is As It Seems By:Gal Guzman Gal Guzman Published:July 25, 2025 Categories:Business Email CompromiseMalwareThreat Research Malware Threat Research Tags:DocusignGenAIGooglePhishing Docusign GenAI Google Phishing Executive Summary Since the creation of the internet, email attacks have been the predominant attack vector for spreading malware and gaining initial access to systems and endpoints. One example of an effective

Score
74
Read more
5
New AWS whitepaper: AWS User Guide to Financial Services Regulations and Guidelines in Australia

New AWS whitepaper: AWS User Guide to Financial Services Regulations and Guidelines in Australia

AWS Security Blog • 9 hours ago

New AWS whitepaper: AWS User Guide to Financial Services Regulations and Guidelines in Australia Amazon Web Services (AWS)has released substantial updates to itsAWS User Guide to Financial Services Regulations and Guidelines in Australiato help financial services customers in Australia accelerate their use of AWS. The updates reflect theAustralian Prudential Regulation Authority’s (APRA) publication of the Prudential StandardCPS 230 Operational Risk Management(CPS 230), which became effective fr

Score
74
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

AGENCIES
CISA
FSB
COMPANIES
AMD
Adobe
Akamai
Amazon
Apple
INDUSTRIES
Banking
Education
ATTACK TYPES
Credential Theft
Phishing
Ransomware
Social Engineering
COUNTRIES
Russia
VULNERABILITIES
DDoS
DoS
PLATFORMS
AWS
Android
Apache
Azure
IIS
SECURITY VENDORS
Akamai
Cloudflare
MITRE ATT&CK
Phishing
Process Injection
RANSOMWARE
AnDROid
Brazilian
First
Hunt
JCrypt
MALWARE
Dark
ARTICLE INFORMATION
Article #4382
Published 2 days ago
GB Hackers