Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

WhatsApp Malware Hits Brazil Banks

November 12, 2025
Reading Time: 3 mins read
in Alerts
WhatsApp Malware Hits Brazil Banks

Cybersecurity analysts have uncovered close ties between two distinct banking malware families, Coyote and Maverick. According to a report by CyberProof, both malicious programs are developed using .NET, focus on users and financial institutions in Brazil, and share key features. Specifically, they possess identical functionality for decrypting data, targeting banking URLs, and monitoring active banking applications. Crucially, a common and notable feature is their ability to self-propagate through the desktop web version of WhatsApp. This shared infrastructure and targeting strategy has prompted investigation into whether Maverick is a successor or evolution of the older Coyote strain.

The campaign associated with Maverick, which Trend Micro first documented and attributed to the actor “Water Saci,” involves a two-stage attack. The initial component, dubbed SORVEPOTEL, is a self-propagating piece of malware spread via WhatsApp Web, which then delivers a compressed ZIP archive containing the final Maverick payload. Once executed, the malware monitors active browser tabs, constantly checking URLs against a hard-coded list of Latin American financial institutions. If a match is found, it connects to a remote command-and-control (C2) server to download and execute further commands, which are used to gather system data and serve highly convincing phishing pages designed to steal user credentials.

The question of a relationship between the two strains has been a subject of debate among security researchers. Sophos was the first to publicly suggest a possible link, proposing that Maverick might be an evolution of Coyote due to the significant overlaps in targeting and mechanism. While a subsequent analysis by Kaspersky confirmed that Maverick shares numerous code overlaps with Coyote, the firm chose to treat it as an entirely new and distinct threat targeting Brazil on a massive scale. The latest detailed findings from CyberProof further solidify the similarities, adding more evidence to the theory that Maverick is a direct successor or highly modified version of its predecessor.

CyberProof’s technical analysis detailed the initial compromise path: the ZIP archive contains a Windows shortcut (LNK) file that, when activated, triggers a command prompt or PowerShell script. This script connects to an external server to fetch the first-stage payload, which is a powerful PowerShell script designed to launch tools capable of disabling key security features like Microsoft Defender Antivirus and User Account Control (UAC) before retrieving a final .NET loader. This sophisticated loader includes anti-analysis techniques to detect and self-terminate if it finds reverse-engineering tools, ensuring operational security. Only after these checks, and after verifying the victim is geographically located in Brazil (via time zone, language, and regional settings), are the main modules—SORVEPOTEL and Maverick—deployed. CyberProof also noted an expansion of targeting, finding evidence that the malware is being deployed to single out hotels within Brazil.

These findings coincide with a separate report from Trend Micro, detailing a new attack chain employed by Water Saci. This new campaign uses an email-based C2 infrastructure, incorporates multi-vector persistence for increased resilience, and includes advanced checks to restrict execution to systems running in Portuguese, enhancing its stealth. According to the company, this updated attack features a sophisticated remote management system, giving the threat actors real-time control to pause, resume, and monitor the malware campaign, effectively turning compromised machines into a dynamic botnet for coordinated operations across multiple endpoints.

Reference:

  • WhatsApp Malware Maverick Targets Browser Sessions Of Major Banks In Brazil
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityNovember 2025
ADVERTISEMENT

Related Posts

WhatsApp Malware Hits Brazil Banks

Npm Package Targets GitHub Repos

November 12, 2025
WhatsApp Malware Hits Brazil Banks

GootLoader Returns With Font Trick

November 12, 2025
Delayed Payloads Hit Nuget Packages

Glassworm Found In Three VS Code Addons

November 11, 2025
Delayed Payloads Hit Nuget Packages

Triofox Flaw Lets Hackers Install Remote

November 11, 2025
Delayed Payloads Hit Nuget Packages

Delayed Payloads Hit Nuget Packages

November 11, 2025
Lost iPhone Beware Fake Text Claims

Samsung Flaw Used To Install Landfall

November 10, 2025

Latest Alerts

Npm Package Targets GitHub Repos

GootLoader Returns With Font Trick

WhatsApp Malware Hits Brazil Banks

Glassworm Found In Three VS Code Addons

Triofox Flaw Lets Hackers Install Remote

Delayed Payloads Hit Nuget Packages

Subscribe to our newsletter

    Latest Incidents

    GlobalLogic Confirms Data Breach

    Hamburg Miniature Museum Hit By Hack

    Fraudster Jailed In £5.5Bn Bitcoin Scam

    Italian Adviser Targeted By Paragon Spyware

    Manassas Schools Close After Cyberattack

    Chinese Breach Exposes Cyber Weapons

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial