Coyote Malware Exploits Microsoft’s UI Automation to Steal Banking Credentials

In a significant development within the cybersecurity landscape, researchers have identified the first active exploitation of Microsoft’s User Interface Automation (UIA) framework by malware. The Coyote banking trojan, initially detected in February 2024, has evolved to incorporate this sophisticated technique, marking a notable escalation in malware capabilities and attack methodologies.

Understanding the Coyote Banking Trojan

Coyote is a banking trojan that primarily targets users and financial institutions in Brazil. Its primary objective is to harvest login credentials from a wide array of banking institutions and cryptocurrency exchanges. The malware employs traditional methods such as keylogging and phishing overlays to achieve its goals. However, its recent adaptation to exploit the UIA framework sets it apart from other malware strains.

The Role of Microsoft’s UI Automation Framework

Microsoft’s UI Automation (UIA) framework is an accessibility feature designed to assist users with disabilities by providing programmatic access to user interface elements. This framework enables assistive technologies, like screen readers, to interact with and manipulate UI components across different applications. While UIA serves a legitimate and beneficial purpose, its capabilities can be misused by malicious actors to interact with and control applications without the user’s knowledge.

Mechanism of Exploitation

The Coyote malware leverages the UIA framework to identify and extract sensitive information from targeted applications. The process unfolds as follows:

1. Foreground Window Identification: Coyote invokes the `GetForegroundWindow()` Windows API to obtain a handle to the currently active window.

2. Window Title Comparison: The malware compares the title of the active window against a hardcoded list of targeted banking and cryptocurrency exchange web addresses.

3. UIA Exploitation: If no direct match is found, Coyote initiates its UIA exploitation phase. It creates a UIAutomation COM object using the foreground window as its top element.

4. Element Iteration: The malware systematically iterates through each sub-element of the foreground application to locate browser tabs or address bars containing relevant financial service URLs.

5. Credential Harvesting: Upon identifying a targeted web address, Coyote can extract login credentials and other sensitive information entered by the user.

This method allows Coyote to parse UI elements across different applications without requiring detailed knowledge of specific application structures, making it a versatile and potent threat.

Implications for Cybersecurity

The exploitation of the UIA framework by Coyote represents a significant advancement in malware sophistication. By abusing a legitimate accessibility feature, the malware can operate stealthily, evading detection by traditional security measures. This development underscores the need for enhanced monitoring and detection strategies that account for the potential misuse of system features designed for accessibility.

Recommendations for Mitigation

To defend against threats like the Coyote malware, organizations and individuals should consider the following measures:

– Monitor UIA Activity: Implement monitoring solutions that can detect unusual activity involving the UIAutomationCore.dll and related named pipes.

– User Education: Educate users about the risks of phishing attacks and the importance of verifying the authenticity of websites before entering sensitive information.

– Regular Updates: Ensure that all software, including operating systems and security tools, are regularly updated to patch known vulnerabilities.

– Access Controls: Limit user permissions to the minimum necessary to perform their duties, reducing the potential impact of malware infections.

By adopting these strategies, organizations can enhance their resilience against sophisticated malware threats that exploit legitimate system features for malicious purposes.