Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays
嗯,用户让我总结这篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要快速浏览文章,抓住主要信息。 文章讲的是一个新的银行木马VENON,用Rust语言写的,针对巴西用户。这和之前用Delphi的恶意软件不同。VENON有银行覆盖逻辑、窗口监控和LNK劫持机制,这些行为和已知的恶意软件类似。传播方式是通过DLL侧加载,使用PowerShell脚本分发。一旦执行DLL,会进行多种 evasion 技术,并连接C2服务器。还针对Itaú银行应用劫持快捷方式,支持卸载步骤以隐藏痕迹。 总结时要涵盖:VENON是新木马,用Rust写,针对巴西银行用户,功能包括窗口监控、LNK劫持、复杂的传播机制和evasion技术。最后要控制在100字左右。 </think> 新的银行木马VENON以Rust语言编写,针对巴西用户,具备银行覆盖逻辑、窗口监控和LNK劫持功能。其传播利用DLL侧加载技术,并通过PowerShell分发恶意负载。一旦执行DLL,会实施多种 evasion 技术并连接C2服务器。该木马还针对Itaú银行应用劫持快捷方式,并支持卸载以隐藏痕迹。 2026-3-12 17:31:0 Author: thehackernews.com(查看原文) 阅读量:5 收藏

Rust-Based VENON Malware

Cybersecurity researchers have disclosed details of a new banking malware targeting Brazilian users that's written in Rust, marking a significant departure from other known Delphi-based malware families associated with the Latin American cybercrime ecosystem.

The malware, which is designed to infect Windows systems and was first discovered last month, has been codenamed VENON by Brazilian cybersecurity company ZenoX.

What makes VENON notable is that it shares behaviors that are consistent with established banking trojans targeting the region, such as Grandoreiro, Mekotio, and Coyote, specifically when it comes to features like banking overlay logic, active window monitoring, and a shortcut (LNK) hijacking mechanism.

The malware has not been attributed to any previously documented group or campaign. However, an earlier version of the artifact, dating back to January 2026, has been found to expose full paths from the malware author's development environment. The paths repeatedly reference a Windows machine username "byst4" (e.g., "C:\Users\byst4\...").

"The Rust code structure presents patterns suggesting a developer familiar with the capabilities of existing Latin American banking trojans, but who used generative AI to rewrite and expand these functionalities in Rust, a language that requires significant technical experience to use at the observed level of sophistication," ZenoX said.

VENON is distributed by means of a sophisticated infection chain that uses DLL side-loading to launch a malicious DLL. It's suspected that the campaign leverages social engineering ploys like ClickFix to trick users into downloading a ZIP archive containing the payloads by means of a PowerShell script.

Once the DLL is executed, it performs nine evasion techniques, including anti-sandbox checks, indirect syscalls, ETW bypass, AMSI bypass, before actually initiating any malicious actions. It also reaches out to a Google Cloud Storage URL to retrieve a configuration, install a scheduled task, and establish a WebSocket connection to the command-and-control (C2) server.

Also extracted from the DLL are two Visual Basic Script blocks that implement a shortcut hijacking mechanism exclusively targeting the Itaú banking application. The components work by replacing the legitimate system shortcuts with tampered versions that redirect the victim to a web page under the threat actor's control.

The attack also supports an uninstall step to undo the modifications, suggesting that the operation can be remotely controlled by the operator to restore the shortcuts to what they originally were to cover up the tracks.

In all, the banking malware is equipped to target 33 financial institutions and digital asset platforms by monitoring the window title and active browser domain, springing into action only when any of the targeted applications or websites are opened to facilitate credential theft by serving fake overlays.

The disclosure comes amid campaigns where threat actors are exploiting the ubiquity of WhatsApp in Brazil to distribute a worm named SORVEPOTEL via the messaging platform's desktop web version. The attack hinges on abusing previously authenticated chats to deliver malicious lures directly to victims, ultimately resulting in the deployment of banking malware such as Maverick, Casbaneiro, or Astaroth.

"A single WhatsApp message delivered through a hijacked SORVEPOTEL session was sufficient to draw a victim into a multi-stage chain that ultimately resulted in an Astaroth implant running fully in memory," Blackpoint Cyber said.

"The combination of local automation tooling, unsupervised browser drivers, and user-writable runtimes created an unusually permissive environment, allowing both the worm and the final payload to establish themselves with minimal friction."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/rust-based-venon-malware-targets-33.html
如有侵权请联系:admin#unsafe.sh