Article illustration 1

A dangerous evolution of the Coyote banking trojan is leveraging Windows' core accessibility infrastructure to conduct reconnaissance on high-value financial targets, cybersecurity researchers reveal. Microsoft's UI Automation (UIA) framework—intended to enable assistive technologies for users with disabilities—is being weaponized to identify active banking and cryptocurrency exchange sessions for data theft.

The Accessibility Backdoor

Microsoft's UIA allows programs to inspect and interact with application UI elements through an automation tree. As Akamai researchers warned in December 2024, this powerful capability creates a security blind spot:

"Malware can traverse browser tabs and address bars to extract URLs without triggering endpoint detection, effectively turning an accessibility feature into a surveillance tool."

Coyote's Novel Attack Chain

The malware—primarily targeting Brazilian users—scans for 75 specific financial services including Banco do Brasil, Santander, Binance, and Bitcoin wallets. Its updated workflow combines traditional tactics with UIA exploitation:
1. Initial Recon: Checks window titles for target names
2. UIA Fallback: If titles don't match, parses browser tabs/address bars via UIA
3. Target Validation: Cross-references URLs against hardcoded financial sites
4. Data Theft: Deploys keyloggers or phishing overlays post-identification

Article illustration 2

Demonstration of UIA-based credential theft (Source: Akamai)

Beyond Reconnaissance

While current attacks use UIA only for target identification, Akamai demonstrated proof-of-concept credential theft using the same framework. This mirrors years of Android accessibility abuse, where malware like Anatsa exploited similar features until Google implemented countermeasures.

The Silent Threat Landscape

This represents a significant escalation in Windows malware sophistication:
- Detection Evasion: UIA interactions appear legitimate to security tools
- Precision Targeting: Focuses exclusively on high-value financial sessions
- Future Risk: Framework could enable automated form input manipulation

Microsoft hasn't yet commented on potential safeguards. For now, the malware's abuse of built-in Windows capabilities highlights the delicate balance between accessibility and security—a balance malicious actors increasingly exploit.

Source: BleepingComputer with research from Akamai