Netcrook Logo
👤 TRUSTBREAKER
🗓️ 14 Apr 2026   🌍 South America

Phantom Installers: Latin American Financial Networks Under Siege by Janela RAT

A sophisticated malware campaign exploits fake installers and rogue browser extensions to siphon sensitive data from banks and crypto users across Chile, Colombia, and Mexico.

It starts with a simple download - a trusted-looking Windows installer from a public repository. But beneath the familiar icon lurks a digital predator: Janela RAT. As financial institutions across Latin America scramble to contain yet another wave of breaches, Netcrook investigates how a cunning blend of fake software, browser manipulation, and encrypted communication is fueling a silent data heist in the region’s financial sector.

Inside the Janela RAT Operation

First surfacing in mid-2023, Janela RAT is believed to be a weaponized offshoot of the notorious BX RAT. Its delivery method is as insidious as it is effective: attackers upload booby-trapped MSI installation files to public repositories, camouflaged as legitimate software. Unsuspecting users - often employees at financial firms - are lured in, downloading what they believe are safe applications.

Execution of the installer sets off a carefully choreographed infection chain. Scripts written in Go, PowerShell, and batch language unpack a password-protected archive, unleashing the Janela RAT executable and a custom-built, malicious browser extension. This extension is the campaign’s linchpin, leveraging Chromium-based browsers’ APIs to intercept browser history, cookies, tab activity, and even detect when users visit banking or cryptocurrency platforms. In those moments, the RAT springs into action, harvesting credentials with chilling efficiency.

The malware’s stealth is enhanced by several layers of obfuscation. Its binaries are heavily scrambled; command-and-control (C2) servers are hidden behind base64 encoding and frequently rotated to avoid blacklisting. Communication between infected machines and these servers is encrypted via WebSockets, making network traffic analysis a challenge for defenders. When not actively exfiltrating data, Janela RAT mimics dormancy, further reducing the likelihood of detection.

Security analysts warn that this campaign signals a renewed and highly professionalized push by Latin American cybercriminals to exploit both software supply chains and browser vulnerabilities. The blending of native installer abuse with browser extension hijacking marks a significant escalation in tactics, putting not only individuals but entire organizations at risk of large-scale credential theft.

Conclusion: The Stakes of Digital Trust

The spread of Janela RAT is a stark reminder: in today’s threat landscape, even the most routine downloads can unleash havoc. As Latin American financial networks grapple with this new breed of cyberattack, the message is clear - digital trust must be earned and constantly re-evaluated. For defenders, layered vigilance and proactive threat hunting are no longer optional but essential. For users, a moment’s caution before clicking “Install” could mean the difference between safety and becoming the next victim.

WIKICROOK

  • Remote Access Trojan (RAT): A Remote Access Trojan (RAT) is malware that lets attackers secretly control a victim’s computer from anywhere, enabling theft and spying.
  • MSI Installer: An MSI Installer is a Windows file format used to install, update, or remove software. It can also be exploited to distribute malicious programs.
  • Browser Extension: A browser extension is a small add-on that enhances browser features but can also be misused by hackers to steal data or spy on users.
  • Obfuscation: Obfuscation is the practice of disguising code or data to make it difficult for humans or security tools to understand, analyze, or detect.
  • Command: A command is an instruction sent to a device or software, often by a C2 server, directing it to perform specific actions, sometimes for malicious purposes.
Janela RAT Latin America Cybersecurity

TRUSTBREAKER TRUSTBREAKER
Zero-Trust Validation Specialist
← Back to news