Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Discover the Top 10 Best Data Loss Prevention Software
May 13, 2026
Microsoft Teams Vulnerability Enables Spoofing Attacks
May 13, 2026
Microsoft Patch Tuesday May 2026: Vulnerabilities Fixed
May 12, 2026
Home/Threats/Janela RAT Steals Data via Fake MSI & Malicious Campaign Uses
Threats

Janela RAT Steals Data via Fake MSI & Malicious Campaign Uses

A new malware campaign, deploying the Remote Access Trojan (RAT) known as Janela RAT, is actively targeting financial institutions and cryptocurrency platforms across Latin America. The threat actors...

Marcus Rodriguez
Marcus Rodriguez
April 14, 2026 3 Min Read
6 0

A new malware campaign, deploying the Remote Access Trojan (RAT) known as Janela RAT, is actively targeting financial institutions and cryptocurrency platforms across Latin America.

The threat actors behind this attack are using fake MSI installer files and malicious browser extensions to infiltrate systems and steal sensitive financial data from unsuspecting victims.

Janela RAT was first identified in mid-2023 and is widely believed to be a modified variant of BX RAT, an older trojan repurposed with more advanced capabilities.

The malware specifically targets users in Chile, Colombia, and Mexico, and has been built to strike at the banking, fintech, and cryptocurrency sectors.

The threat actors running this campaign are financially motivated, with a clear goal of stealing credentials and gaining unauthorized access to accounts.

KPMG analysts noted and identified the advanced multi-stage structure of this attack, flagging it as a significant threat to Latin America’s financial infrastructure.

Researchers highlighted how Janela RAT disguises itself as trusted software on public GitLab repositories, making it harder for users to spot the danger before damage is done.

The campaign’s ability to quietly manipulate installed browsers while maintaining encrypted communication with attacker-controlled servers makes it particularly difficult to contain.

The overall impact of this campaign goes well beyond simple data theft. By accessing browsers and harvesting cookies, saved credentials, and browsing history, the attackers gain complete visibility into a victim’s financial activity.

This level of access allows them to bypass authentication steps, take over accounts, or monitor live financial transactions without the victim realizing what is happening.

For organizations operating in the banking and fintech space, this kind of infiltration poses a serious operational and reputational risk.

What makes Janela RAT especially dangerous is how it combines multiple scripting tools and layers of techniques to stay hidden long after the initial infection.

Encrypted command-and-control communications, alongside behavior that mimics normal browser activity, makes this malware very hard to detect with standard security tools.

Multi-Stage Infection and Browser Hijacking

The infection begins the moment a user runs what appears to be a regular software installer in MSI format. These installer files are hosted on public GitLab repositories and are carefully disguised to appear trustworthy and legitimate.

Once executed, the installer quietly triggers a chain of scripts written in Go, PowerShell, and batch, each playing a specific role in setting up the full attack.

A Go-based unpacker then extracts a password-protected ZIP file, decodes base64-encoded command-and-control domain details, and writes all of it into a config.json file for operational use during the campaign.

At the same time, the scripts scan the infected machine for any Chromium-based browsers and quietly modify their startup settings to silently load a malicious extension without the user’s knowledge.

This extension registers itself as a native messaging host and uses a built-in function called CollectRefresh to collect a wide range of sensitive data — including system details, browser cookies, browsing history, installed extensions, and open tab information.

It also monitors for specific URL patterns, triggering further RAT actions whenever a match is found, such as a banking or cryptocurrency login page.

To avoid detection, Janela RAT establishes encrypted WebSocket connections to its C2 servers using obfuscated, base64-encoded domains.

The malware also rotates its C2 addresses dynamically and stays quiet during idle periods to avoid triggering behavior-based security alarms. Together, these techniques allow the malware to operate for extended periods without being noticed.

Security teams are advised to take the following steps to reduce exposure to this threat:-

  • Monitor your environment for known Indicators of Compromise (IoCs), including the domains, IP addresses, and file hashes associated with this campaign.
  • Ensure all Windows systems are fully patched and protected with multi-factor authentication (MFA).
  • Conduct a full-spectrum threat assessment exercise to uncover blind spots and gaps in your security posture.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarePatchSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Obsidian Shell Plugin Exploited for Cross-Platform

Next Post

Codex Exploits World-Writable Drivers to Root Samsung TVs

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Top MSSPs Prevent Incidents with Live Threat Visibility
May 12, 2026
Ivanti Patches Critical Vulnerabilities in Secure Access &
May 12, 2026
Open WebUI File Upload Vulnerability Allows 1 Leads Attack
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us