JanelaRAT an Advanced Banking Trojan Targeting Financial Users

JanelaRAT is an evolving Remote Access Trojan targeting financial users in Latin America using multi stage infection chains, phishing and DLL sideloading to steal banking and cryptocurrency data while employing evasion, persistence and interactive techniques to bypass security controls.

Pulse ID: 69e48460c771926e0e7231bc
Pulse Link: https://otx.alienvault.com/pulse/69e48460c771926e0e7231bc
Pulse Author: cryptocti
Created: 2026-04-19 07:29:36

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Bank #BankingTrojan #CyberSecurity #InfoSec #LatinAmerica #OTX #OpenThreatExchange #Phishing #RAT #RemoteAccessTrojan #SideLoading #Trojan #bot #cryptocurrency #cryptocti

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Unpacking Augmented Marauder’s Multi-Pronged Casbaneiro Campaigns

BlueVoyant researchers have uncovered a broad, multi-pronged phishing campaign targeting Spanish-speaking users in organizations across Latin America and now Europe as well. While recent industry intelligence heavily documented attacks utilizing WhatsApp to deliver banking trojans under the umbrella of the Brazil-based eCrime group Augmented Marauder (a.k.a. Water Saci)

Pulse ID: 69cd1d262a834decd25abb14
Pulse Link: https://otx.alienvault.com/pulse/69cd1d262a834decd25abb14
Pulse Author: AlienVault
Created: 2026-04-01 13:27:02

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Bank #BankingTrojan #Brazil #CyberSecurity #Europe #InfoSec #LatinAmerica #OTX #OpenThreatExchange #Phishing #Trojan #WhatsApp #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

🚨 Alert: The new #EternidadeStealer is using WhatsApp to spread malicious files to steal banking and crypto data from users. Watch out and don’t open unexpected attachments, plus verify messages from contacts.

Read: https://hackread.com/eternidade-stealer-whatsapp-steal-banking-data/

#CyberSecurity #Malware #WhatsApp #BankingTrojan #InfoSec

New Eternidade Stealer Uses WhatsApp to Steal Banking Data

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

📰 Herodotus Android Malware Mimics Human Typing to Bypass Biometric Security

🤖 New "Herodotus" Android banking trojan mimics human typing to bypass biometric security! Sold as MaaS, it takes over devices to steal from banking & crypto apps. Active in Italy & Brazil. #Android #Malware #BankingTrojan #MobileSecurity

🔗 https://cyber.netsecops.io/articles/herodotus-android-malware-mimics-human-typing-to-evade-detection/?utm_source=mastodon&utm_medium=social&utm_campaign=twitter_auto

Herodotus Android Malware Mimics Human Typing to Bypass Biometric Security

The Herodotus Android banking trojan, a new MaaS offering, evades behavioral biometric detection by mimicking human typing patterns to conduct fraudulent transactions.

CyberNetSec.io

Android malware alert: Mobdro Pro IP TV + VPN installs Klopatra banking Trojan, compromising devices and banking credentials.

More info: https://www.technadu.com/fake-vpn-spreads-malware-targeting-android-banking-accounts/611164/

#AndroidSecurity #CyberSecurity #BankingTrojan #MobileSecurity #VPN #TechNadu

ERMAC V3.0's source code leak reveals a crafty banking trojan overlaying fake forms on trusted apps—and its glaring vulnerabilities could reshape cyber defenses. How safe are your apps?

https://thedefendopsdiaries.com/unveiling-ermac-v30-a-deep-dive-into-the-android-malware-source-code-leak/

#ermacv3
#androidmalware
#cybersecurity
#bankingtrojan
#malwareanalysis

Unveiling ERMAC V3.0: A Deep Dive into the Android Malware Source Code Leak

Explore the ERMAC V3.0 Android malware leak, revealing its sophisticated banking trojan tactics and infrastructure vulnerabilities.

The DefendOps Diaries

Mekotio banking trojan resurges in Latin America, targeting financial systems. Delivered via phishing emails, it steals banking credentials, captures screenshots, logs keystrokes, and maintains persistence. Primarily affecting Brazil, Chile, Mexico, Spain, and Peru, Mekotio employs sophisticated social engineering tactics. Users should practice email security and verify sender identities to mitigate risks.

#Mekotio #BankingTrojan #CyberSecurity #PhishingAttacks #FinancialFraud #GeneratedByAI

https://www.trendmicro.com/en_us/research/24/g/mekotio-banking-trojan.html

Mekotio Banking Trojan Threatens Financial Systems in Latin America

We’ve recently seen a surge in attacks involving the Mekotio banking trojan. In this blog entry, we'll provide an overview of the trojan and what it does.

Trend Micro
Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide

Grandoreiro banking trojan is back, targeting 1,500+ banks in 60+ countries. It now uses infected Outlook to spread phishing emails.

The Hacker News

Kaspersky describes the new banking trojan, SoumniBot, which targets Korean users and is notable for an unconventional approach to evading analysis and detection (exploiting bugs in the Android manifest extraction and parsing procedure). They describe the features and functionality for SoumniBot. Its success is due to insufficiently strict validations in the Android manifest parser code. IOC provided. 🔗 https://securelist.com/soumnibot-android-banker-obfuscates-app-manifest/112334/

#SoumniBot #IOC #threatintel #bankingtrojan #malware

SoumniBot: the new Android banker's unique techniques

We review the new mobile Trojan banker SoumniBot, which exploits bugs in the Android manifest parser to dodge analysis and detection.

Kaspersky