A newly discovered banking Trojan named CHAVECLOAK is causing concern among cybersecurity researchers as it employs various tactics, including SMS phishing, phishing emails, and compromised websites, to target Brazilian banking users. The Trojan, identified by FortiGuard Labs, poses a high-severity threat by targeting Windows devices and gaining access to online banking platforms, where it stealthily steals banking credentials and financial information. The infection method of CHAVECLOAK is currently under investigation, with researchers suspecting distribution channels such as phishing emails and SMS phishing campaigns. Moreover, the Trojan utilizes deceptive techniques, including Portuguese language settings, DLL sideloading, and deceptive pop-ups, to trick unsuspecting users and evade detection while actively monitoring victims’ interactions with financial portals.
The sophistication of CHAVECLOAK is evident in its utilization of DLL sideloading, a technique that allows the malware to exploit legitimate processes without raising suspicion. This poses a significant security risk, as it enables the Trojan to execute malicious code discreetly, facilitating unauthorized activities such as data theft. Additionally, CHAVECLOAK employs deceptive tactics, such as distributing malicious PDF files disguised as legitimate contract documents with Portuguese instructions, to lure victims into downloading malware. Upon execution, the Trojan communicates with its command-and-control (C2) server, facilitating actions to steal credentials, log keystrokes, and display deceptive pop-up windows to further deceive victims.
Furthermore, CHAVECLOAK actively monitors victims’ access to financial portals, including Mercado Bitcoin, the largest digital currency exchange in Brazil and Latin America. This highlights the Trojan’s focus on targeting financial institutions and underscores the importance of robust security measures for online banking users. To protect against CHAVECLOAK and similar banking Trojans, users are advised to exercise caution with emails and SMS messages, verify website legitimacy, enable two-factor authentication (2FA), use strong passwords, and regularly update their operating systems and security software to address known vulnerabilities. Additionally, users should avoid clicking on suspicious links or attachments and double-check website URLs for typos or minor variations to mitigate the risk of falling victim to such sophisticated cyber threats.