Skip to content
Tech News
← Back to articles

New TCLBanker malware self-spreads over WhatsApp and Outlook

read original get Cybersecurity USB Data Block → more articles
Why This Matters

The TCLBanker malware represents a significant evolution in banking trojans, leveraging self-spreading mechanisms via WhatsApp and Outlook to rapidly infect systems and evade detection. Its targeted approach towards financial platforms and sophisticated anti-analysis features underscore the growing complexity of cyber threats in the financial sector, emphasizing the need for enhanced security measures for consumers and institutions alike.

Key Takeaways

A new trojan named TCLBanker, which targets 59 banking, fintech, and cryptocurrency platforms, uses a trojanized MSI installer for Logitech AI Prompt Builder to infect systems.

Additionally, the malware includes self-spreading worm modules for WhatsApp and Outlook that automatically infect new victims.

The new banking trojan was discovered by Elastic Security Labs, whose researchers believe it’s a major evolution of the older Maverick/Sorvepotel malware family.

While TCLBanker currently appears focused in Brazil, specifically checking timezone, keyboard layout, and locale, LATAM malware has, in the past, been updated to broaden its targeting scope, so the risk of the threat expanding is real.

TCLBanker capabilities

Elastic warns that TCLBanker is extremely well protected against analysis and debugging, featuring environment-dependent payload decryption routines that fail in sandboxes or analyst environments.

It also runs a persistent watchdog thread that continuously hunts for analysis tools like x64dbg, IDA, dnSpy, Frida, ProcessHacker, Ghidra, de4dot, and others.

Monitoring for targeted processes

Source: Elastic

The malware is loaded within the context of the legitimate Logitech application via DLL side-loading, so it won’t trigger any alarms from security products protecting the infected host.

... continue reading