Friday, March 21, 2025
HomeMalwareBrazilian Banking Trojan Allows Attackers Hijack Victims Bank Account and Send Himself...

Brazilian Banking Trojan Allows Attackers Hijack Victims Bank Account and Send Himself Victims Funds

Published on

SIEM as a Service

Follow Us on Google News

Brazilian Banking Trojan Which Delivering under the name vm.png through Spam Email campaigns, allows attackers to Hijack victim devices and attackers send himself Victims Funds.

An old banking fraud toolkit first discovered by IBM Trusteer in January 2015 has reared its ugly head again, this time in the form of a trojan called Boleto which uses overlay technique to dupe consumers of their banking details and even money.

The user-friendly Trojan is available in the Brazilian black market and can be used by hackers with minimal technical skills but is almost as deadly as some of the popular tools like Trickbot or those offered by Zeus.

While the aforementioned tools use phishing attacks, Boleto uses malware sent through email attachments to install Java code using a JAR file.

Also Read : Sockbot Android Malware Found in Eight Apps on Google Play with 2.6 million Installations

How This  Banking Trojan works

Upon opening a malicious mail infected by the malware, the user is forced to install Java code using a JAR file.

The JAR file contains an executable VMware file called vprintproxy.exe(hidden under a png file) which is a legitimate file signed by VMware.

Using DLL hijacking techniques the malicious code is then stored in vmwarebase.dll, thus going under the scanner of an anti-virus or anti-malware scanner.

Malware Working Function

Once in, as most malware do, it waits and bides its time till the end user logs into his/her banking site.

Once logged in, the malware sends an SMS to the remote attacker and a pop-ups an authentic looking overlay screen on top the user’s browser.

  • Keylogger
  • Screenshots
  • Replacing current screen with a provided image
  • Changing current system cursor
  • Autorun registry persistence establishment
  • Shutting down system utilities (such as taskmgr, dwm, regedit etc.)
  • Invoking system reboot
  • File\dir deletion functions

The Malware Module Interconnection:

The purpose of the overlay is to distract the user while underneath the overlay, the attacker makes merry with the logged in user information and conduct transactions as his/her will usually involving transferring money, stealing information etc.

This Trojan Kill some unwanted Process such as taskmgr.exe,msconfig.exe, regedit.exe, ccleaner.exe / ccleaner64.exe, dwm.exe (for Windows 7 only) iexplore.exe,iexplore.exe,iexplore.exe, firefox.exe,chrome.exe, opera.exe, opera.exe,safari.exe, NetExpress50.exe AplicativoBradesco.exe

Due to its sheer brilliance, stopping this fraud would require in addition to updated signature patterns for an anti-malware scanner, detection of remote access tools, checking for out of the ordinary browser behaviors.

The end user has to be educated on how to deal with the threat with the onus lying on the banks also to educate and inform the users that should such overlays happen during a logged in session, to immediately log out and alert the relevant authorities.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Over 150 US Government Database Servers Vulnerable to Internet Exposure

A recent open-source investigation has uncovered one of the largest exposures of US government...

Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 – Patch Now

A concerning development has emerged with the active exploitation of Apache Tomcat servers through...

UAT-5918 Hackers Exploit N-Day Vulnerabilities in Exposed Web and Application Servers

A recent cybersecurity threat, identified as UAT-5918, has been actively targeting entities in Taiwan,...

MEDUSA Ransomware Deploys Malicious ABYSSWORKER Driver to Disable EDR

In a recent analysis by Elastic Security Labs, a malicious driver known as ABYSSWORKER...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Steganographic Malware Hides in JPEG Files to Spread Infostealers

A recent cybersecurity threat has been identified, where steganographic malware is being distributed through...

Massive “DollyWay” Malware Attack Compromises 20,000+ WordPress Sites Worldwide

A significant malware operation, dubbed "DollyWay," has been uncovered by GoDaddy Security researchers, revealing...

Hackers Use RMM Tools to Maintain Persistence and Navigate Networks Undetected

Threat actors have increasingly been leveraging legitimate remote monitoring and management (RMM) software to...