Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays

Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays

The Hacker News
The Hacker NewsMar 12, 2026

Companies Mentioned

Why It Matters

VENON’s use of Rust raises the technical bar for banking malware, making detection and mitigation harder for Brazilian financial institutions. Its broad targeting of dozens of banks could amplify credential theft and financial fraud across the region.

Key Takeaways

  • Rust language increases malware complexity
  • Targets 33 Brazilian banks and crypto platforms
  • DLL side‑loading bypasses traditional defenses
  • Shortcut hijacking redirects Itaú users
  • AI‑assisted code generation signals advanced threat actors

Pulse Analysis

The emergence of VENON signals a notable evolution in the Latin American cybercrime landscape. While most banking trojans in the region have been written in Delphi or Python, VENON’s Rust foundation offers native performance, memory safety, and harder‑to‑reverse‑engineer binaries. This shift complicates traditional signature‑based detection and forces defenders to adopt behavioral analytics and memory‑dump analysis to spot the malware’s indirect syscalls, ETW and AMSI bypasses.

VENON’s infection chain is a multi‑stage operation that begins with a socially engineered ZIP file delivered via PowerShell scripts, often masquerading as legitimate software. Once the malicious DLL is side‑loaded, it executes nine evasion techniques before contacting a Google Cloud Storage endpoint for configuration. The payload then installs a scheduled task, opens a WebSocket C2 channel, and injects visual‑basic shortcut hijacks that specifically target the Itaú banking client, delivering fake login overlays only when the victim accesses targeted banking windows.

For Brazil’s financial sector, the threat is acute. By compromising 33 institutions, VENON can harvest millions of credentials, potentially enabling large‑scale fraud or ransomware extortion. The use of AI‑generated Rust code suggests threat actors are investing in higher‑skill development pipelines, which may spill over into other regions and sectors. Banks must strengthen endpoint detection, enforce strict macro and script policies, and monitor for anomalous shortcut changes and unusual network traffic to mitigate this sophisticated threat.

Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays

Comments

Want to join the conversation?

Loading comments...