A highly advanced JanelaRAT malware campaign featuring the JanelaRAT trojan is aggressively targeting banks and financial institutions across Latin America. Notably, cybersecurity experts have observed a sharp increase in attacks, particularly in Brazil and Mexico. In fact, Brazil alone has recorded more than 14,700 attacks in 2025, while Mexico has reported over 11,000 incidents, highlighting the scale and intensity of this ongoing cyber threat.
To begin with, JanelaRAT is an evolved variant of the earlier BX RAT malware. However, unlike its predecessor, this version has been specifically engineered to steal sensitive financial and cryptocurrency-related information. Moreover, it goes beyond simple data theft by incorporating advanced surveillance capabilities. For instance, it can log keystrokes, capture screenshots, track mouse activity, and gather detailed system-level information from compromised devices.
What truly sets JanelaRAT apart, however, is its innovative “title bar detection” mechanism. This feature enables the malware to identify when a user accesses specific banking platforms. As a result, it can instantly trigger malicious actions tailored to those platforms, making it particularly dangerous for online banking users.
Furthermore, the infection process itself is both complex and highly evasive. Typically, attackers initiate the attack using ZIP files that contain Visual Basic scripts. These scripts then download additional payloads onto the victim’s system. In many cases, the payload includes legitimate-looking executable files combined with malicious DLL files. By leveraging DLL side-loading techniques, the malware successfully bypasses traditional security defenses.
In addition to this, researchers have discovered that cybercriminals also distribute JanelaRAT through fake installer packages disguised as trusted software. Once users unknowingly install these packages, the malware deploys scripts written in languages such as Go, PowerShell, and batch scripting. These scripts help establish persistence within the system and load further malicious components, including browser extensions.
These malicious browser extensions play a crucial role in the attack. Specifically, they collect sensitive user data such as cookies, browsing history, and session information. At the same time, they enable targeted actions based on specific banking URLs, allowing attackers to monitor and even manipulate financial transactions without the user’s knowledge.
“The campaign highlights the increasing sophistication of financial malware targeting emerging markets, where attackers are continuously evolving techniques to evade detection and maximize impact. Security experts warn that organizations and individuals in the region must strengthen endpoint security, monitor suspicious installations, and remain cautious of unsolicited downloads to mitigate the risks associated with such advanced threats.”
Overall, this campaign underscores the growing complexity of cyberattacks in the financial sector. Therefore, both organizations and individuals must adopt stronger cybersecurity measures to defend against such evolving threats.
Recommended Cyber Technology News:
- Booking.com Warns of Cyberattack and Data Breach Risk
- N-able Launches AI-Native UEM With MCP Server Integration
- Hyperbridge Vulnerability Triggers $237K Crypto Exploit
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading




