Skip to content
Thursday, April 16, 2026

Cyberbytes Daily

Your one stop for cybersecurity news

  • Home

Banking Trojan Coyote Abuses Windows UI Automation

Posted on July 23, 2025
Banking Trojan Coyote Abuses Windows UI Automation

It’s the first known instance of malware that abuses the UIA framework and has enabled dozens of attacks against banks and crypto exchanges in Brazil.

​The original article found on darkreading Read More

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X

Like this:

Like Loading...
Posted in Cyber Security News

Post navigation

Previous: Department of Education Site Mimicked in Phishing Scheme
Next: White House AI plan heavy on cyber, light on implementation

Related Posts

CatB Ransomware Leveraging Microsoft Distributed Transaction Coordinator to Execute its Payload
  • Cyber Security News

CatB Ransomware Leveraging Microsoft Distributed Transaction Coordinator to Execute its Payload

  • cyberbytes
  • April 10, 2025
  • 0

The cybersecurity landscape has witnessed the emergence of a sophisticated threat actor with the appearance of CatB ransomware in late 2022. Also known as CatB99 […]

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X

Like this:

Like Loading...
  • Cyber Security News

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

  • cyberbytes
  • April 28, 2025
  • 0

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted at 194.48.154.79:80, believed to be operated by an affiliate of the […]

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X

Like this:

Like Loading...
PsExec and Renamed Backup Tools Enabled Data Theft Before INC Ransomware Attack
  • Cyber Security News

PsExec and Renamed Backup Tools Enabled Data Theft Before INC Ransomware Attack

  • cyberbytes
  • March 13, 2026
  • 0

A ransomware intrusion in which attackers used legitimate Windows tools and a renamed backup utility to quietly stage and exfiltrate sensitive data before deploying INC […]

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X

Like this:

Like Loading...
Copyright © 2026 Cyberbytes Daily Theme: Press News By Adore Themes.
%d