Description

JanelaRAT, a sophisticated Remote Access Trojan (RAT), is actively targeting banking users across Latin America, with a strong focus on Brazil and Mexico. This malware employs multi-stage infection chains and real-time user activity monitoring to harvest financial credentials and take control of active banking sessions. Researchers have noted an increase in campaigns involving JanelaRAT, indicating that the threat is becoming more refined and strategically targeted. The infection typically begins with phishing emails crafted to resemble legitimate invoices or business communications. Victims are lured into clicking embedded links, which redirect them to attacker-controlled websites hosting malicious payloads. These payloads are often delivered as compressed files or MSI installers. Once executed, they deploy a combination of legitimate applications and malicious DLLs, using DLL sideloading techniques to bypass conventional security defenses. A notable capability of JanelaRAT is its ability to monitor window titles on the infected system. This allows it to identify when a user accesses online banking portals. When such activity is detected, the malware initiates actions like capturing keystrokes, taking screenshots, and manipulating sessions in real time. It also monitors user inactivity to execute its operations more discreetly and avoid raising suspicion. Additionally, JanelaRAT uses deceptive overlay screens, such as fake Windows update prompts, to distract users. While the victim is occupied, attackers can carry out fraudulent transactions in the background, effectively bypassing multi-factor authentication and gaining unauthorized access to financial accounts.