<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Banking-Trojan — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/banking-trojan/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 08 May 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/banking-trojan/feed.xml" rel="self" type="application/rss+xml"/><item><title>TCLBanker Banking Trojan Self-Spreads via WhatsApp and Outlook</title><link>https://feed.craftedsignal.io/briefs/2026-05-tclbanker/</link><pubDate>Fri, 08 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-tclbanker/</guid><description>TCLBanker is a banking trojan targeting 59 financial platforms, spreading via trojanized Logitech AI Prompt Builder installers and worm modules for WhatsApp and Outlook, enabling remote control and data theft.</description><content:encoded><![CDATA[<p>TCLBanker is a newly discovered banking trojan targeting 59 banking, fintech, and cryptocurrency platforms. Discovered by Elastic Security Labs in May 2026, TCLBanker is believed to be an evolution of the Maverick/Sorvepotel malware family. The initial infection vector involves a trojanized MSI installer for Logitech AI Prompt Builder. Once installed, TCLBanker exhibits worm-like behavior, self-spreading through WhatsApp and Microsoft Outlook to propagate to new victims. While currently focused on Brazilian targets, its potential to expand geographically poses a significant risk. TCLBanker is heavily protected against analysis, actively monitoring for debugging and analysis tools. The malware leverages DLL side-loading within the legitimate Logitech application to evade initial detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The victim downloads and executes a trojanized MSI installer for Logitech AI Prompt Builder.</li>
<li>The installer performs DLL side-loading to inject the TCLBanker malware into the legitimate Logitech application process.</li>
<li>TCLBanker monitors the browser address bar using Windows UI Automation APIs, searching for URLs matching its 59 targeted financial platforms.</li>
<li>When a targeted website is accessed, TCLBanker establishes a WebSocket session with its command-and-control (C2) server, sending victim and system information.</li>
<li>The C2 operator gains remote control capabilities, including live screen streaming, screenshot capturing, keylogging, clipboard hijacking, shell command execution, and file system access.</li>
<li>TCLBanker uses a WPF-based overlay system to display fake credential prompts, PIN keypads, and other deceptive overlays to steal sensitive information.</li>
<li>The malware hijacks the victim&rsquo;s WhatsApp account by searching for authenticated WhatsApp Web IndexedDB data in Chromium browser profiles and launching a hidden Chromium instance to send spam messages to contacts, filtering for Brazilian numbers.</li>
<li>TCLBanker abuses Microsoft Outlook through COM automation to harvest contacts and sender addresses, sending phishing emails from the victim&rsquo;s email account to further spread the malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>TCLBanker enables attackers to steal banking credentials, cryptocurrency wallet information, and other sensitive data from victims. It also allows for remote control of infected systems, enabling attackers to perform unauthorized actions, potentially leading to financial loss, identity theft, and further propagation of the malware. The self-spreading capabilities via WhatsApp and Outlook significantly increase the malware&rsquo;s reach, potentially impacting a large number of individuals and organizations, especially those operating in Brazil.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for suspicious instances of <code>msiexec.exe</code> installing software from untrusted sources (see Sigma rule: &ldquo;Detect Suspicious MSI Installer Execution&rdquo;).</li>
<li>Enable Sysmon process creation logging to detect DLL side-loading activity from legitimate applications like the Logitech AI Prompt Builder process, potentially indicating TCLBanker infection.</li>
<li>Monitor network connections for WebSocket traffic originating from systems running legitimate applications that should not be communicating over websockets to external addresses.</li>
<li>Implement network detections for outbound email traffic containing suspicious attachments or links originating from user accounts that have not recently logged into Outlook (see Sigma rule &ldquo;Detect Outlook COM Hijacking&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>banking-trojan</category><category>malware</category><category>worm</category><category>self-spreading</category><category>brazil</category><category>logitech</category></item></channel></rss>