Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays
    Cybersecurity

    Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays

    adminBy adminMarch 13, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Rust-Based VENON Malware
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananMar 12, 2026Malware / Cybercrime

    Rust-Based VENON Malware

    Cybersecurity researchers have disclosed details of a new banking malware targeting Brazilian users that’s written in Rust, marking a significant departure from other known Delphi-based malware families associated with the Latin American cybercrime ecosystem.

    The malware, which is designed to infect Windows systems and was first discovered last month, has been codenamed VENON by Brazilian cybersecurity company ZenoX.

    What makes VENON notable is that it shares behaviors that are consistent with established banking trojans targeting the region, such as Grandoreiro, Mekotio, and Coyote, specifically when it comes to features like banking overlay logic, active window monitoring, and a shortcut (LNK) hijacking mechanism.

    The malware has not been attributed to any previously documented group or campaign. However, an earlier version of the artifact, dating back to January 2026, has been found to expose full paths from the malware author’s development environment. The paths repeatedly reference a Windows machine username “byst4” (e.g., “C:\Users\byst4\…”).

    “The Rust code structure presents patterns suggesting a developer familiar with the capabilities of existing Latin American banking trojans, but who used generative AI to rewrite and expand these functionalities in Rust, a language that requires significant technical experience to use at the observed level of sophistication,” ZenoX said.

    VENON is distributed by means of a sophisticated infection chain that uses DLL side-loading to launch a malicious DLL. It’s suspected that the campaign leverages social engineering ploys like ClickFix to trick users into downloading a ZIP archive containing the payloads by means of a PowerShell script.

    Once the DLL is executed, it performs nine evasion techniques, including anti-sandbox checks, indirect syscalls, ETW bypass, AMSI bypass, before actually initiating any malicious actions. It also reaches out to a Google Cloud Storage URL to retrieve a configuration, install a scheduled task, and establish a WebSocket connection to the command-and-control (C2) server.

    Also extracted from the DLL are two Visual Basic Script blocks that implement a shortcut hijacking mechanism exclusively targeting the Itaú banking application. The components work by replacing the legitimate system shortcuts with tampered versions that redirect the victim to a web page under the threat actor’s control.

    The attack also supports an uninstall step to undo the modifications, suggesting that the operation can be remotely controlled by the operator to restore the shortcuts to what they originally were to cover up the tracks.

    In all, the banking malware is equipped to target 33 financial institutions and digital asset platforms by monitoring the window title and active browser domain, springing into action only when any of the targeted applications or websites are opened to facilitate credential theft by serving fake overlays.

    The disclosure comes amid campaigns where threat actors are exploiting the ubiquity of WhatsApp in Brazil to distribute a worm named SORVEPOTEL via the messaging platform’s desktop web version. The attack hinges on abusing previously authenticated chats to deliver malicious lures directly to victims, ultimately resulting in the deployment of banking malware such as Maverick, Casbaneiro, or Astaroth.

    “A single WhatsApp message delivered through a hijacked SORVEPOTEL session was sufficient to draw a victim into a multi-stage chain that ultimately resulted in an Astaroth implant running fully in memory,” Blackpoint Cyber said.

    “The combination of local automation tooling, unsupervised browser drivers, and user-writable runtimes created an unusually permissive environment, allowing both the worm and the final payload to establish themselves with minimal friction.”

    banks Brazilian CredentialStealing Malware Overlays RustBased Targets VENON
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article10 Best VPNs for Windows in 2026
    Next Article Holy crap! The Galaxy S26 Ultra just ordered dinner and tea for me and all I had to do was hit ‘Confirm’
    admin
    • Website

    Related Posts

    Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

    March 14, 2026

    Red Access firewall-native SSE adds GenAI security and browser protection to existing firewalls

    March 14, 2026

    FBI seeks victims of Steam games used to spread malware

    March 14, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Only 15% of pages retrieved by ChatGPT appear in final answers: Report

    March 14, 2026

    Google Messages is better than ever, but it still leaves me frustrated

    March 14, 2026

    New Qualcomm GBL exploit brings bootloader unlocking to flagship Androids

    March 14, 2026

    Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

    March 14, 2026
    Categories
    • Blogging (40)
    • Cybersecurity (770)
    • Privacy & Online Earning (120)
    • SEO & Digital Marketing (485)
    • Tech Tools & Mobile / Apps (943)
    • WiFi / Internet & Networking (129)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Only 15% of pages retrieved by ChatGPT appear in final answers: Report

    March 14, 2026

    Google Messages is better than ever, but it still leaves me frustrated

    March 14, 2026

    New Qualcomm GBL exploit brings bootloader unlocking to flagship Androids

    March 14, 2026
    Most Popular
    • Only 15% of pages retrieved by ChatGPT appear in final answers: Report
    • Google Messages is better than ever, but it still leaves me frustrated
    • New Qualcomm GBL exploit brings bootloader unlocking to flagship Androids
    • Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials
    • ‘Current’ Fixes My Biggest Issues With RSS Readers
    • Red Access firewall-native SSE adds GenAI security and browser protection to existing firewalls
    • FBI seeks victims of Steam games used to spread malware
    • Why surface-level SEO tactics won’t build lasting AI search visibility
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.