HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

JanelaRAT Malware Launches Over 14,000 Attacks on Latin American Banks in 2025

JanelaRAT, a BX‑RAT derivative, has executed nearly 15,000 attacks against Brazilian and Mexican banks in 2025, stealing financial and cryptocurrency data. The campaign raises third‑party risk for any vendors connected to these institutions, demanding heightened endpoint and credential controls.

LiveThreat™ Intelligence · 📅 April 14, 2026· 📰 thehackernews.com
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
4 recommended
📰
Source
thehackernews.com

JanelaRAT Malware Launches Over 14,000 Attacks on Latin American Banks in 2025

What Happened — A modified BX‑RAT variant, JanelaRAT, has been observed conducting 14,739 targeted attacks against banks and financial institutions in Brazil during 2025, with spill‑over activity in Mexico and other Latin American markets. The malware steals financial and cryptocurrency credentials, logs keystrokes, captures screenshots, and harvests system metadata.

Why It Matters for TPRM

  • High‑volume, credential‑stealing RATs increase the likelihood of downstream data exposure for any third‑party service providers linked to the compromised banks.
  • Financial institutions are a critical supply‑chain node; compromise can cascade to payment processors, fintech platforms, and SaaS vendors handling transaction data.
  • Persistent RAT activity signals a mature threat actor capable of evading traditional AV, demanding stronger endpoint controls from all vendors.

Who Is Affected — Financial Services (banks, credit unions, payment processors), fintech SaaS providers, and any third‑party vendors that integrate with Latin American banking APIs.

Recommended Actions

  • Verify that all banking vendors have up‑to‑date EDR/EDR‑plus solutions and conduct regular threat‑intel feeds for RAT activity.
  • Enforce MFA for all remote and privileged access to banking environments.
  • Review and test incident‑response playbooks that include RAT detection, containment, and forensic analysis.
  • Require vendors to provide evidence of recent security assessments covering malware‑resilience.

Technical Notes — JanelaRAT is delivered via phishing emails and compromised remote‑desktop tools, leveraging a custom loader that bypasses standard AV signatures. It records mouse movements, keystrokes, screenshots, and exfiltrates cryptocurrency wallet files and banking credentials via encrypted C2 channels. No specific CVE is associated; the threat relies on social‑engineering and stealth techniques. Source: The Hacker News

📰 Original Source
https://thehackernews.com/2026/04/janelarat-malware-targets-latin.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.