A new variant of the BBTok banking trojan has recently resurfaced in Latin America, specifically targeting users in Brazil and Mexico. This advanced form of malware has evolved its tactics and techniques , posing a significant threat to organizations and individuals in the region.
BBTok is being distributed through an active malware campaign that specifically targets users in Brazil and Mexico . It replicates the interfaces of over 40 banks in Mexico and Brazil , including BBVA , a popular bank , in order to deceive users into sharing personal and financial information . The malware is coded in Delphi and uses VCL to create custom fake interfaces that match victim screens and bank forms . It also seeks Bitcoin-related data on infected machines .
The campaign uses phishing emails to trick victims into providing their banking information , including 2FA codes . Once the malware is launched, it allows attackers to execute remote commands and gain control of bank accounts. The malware is delivered through LNK files  , SMB , and MSBuild , making it difficult to track and detect .
BBTok has features that allow it to kill processes , issue remote commands    , manipulate keyboards   , and serve fake login pages   . The attack chains use bogus links or ZIP file attachments to deploy the malware while displaying decoy documents   . BBTok evades detection mechanisms such as Antimalware Scan Interface (AMSI) and uses living-off-the-land binaries (LOLBins) and geofencing checks to target victims in Brazil and Mexico .
Once launched   , BBTok establishes connections with a remote server to simulate security verification pages and harvest user credentials   . The malware has shown improvement in obfuscation and targeting since 2020   , expanding beyond Mexican banks . The presence of Spanish and Portuguese language suggests the attackers are likely based in Brazil . Over 150 users have been estimated to be infected by BBTok .
BBTok poses a significant danger to organizations and individuals in Latin America, particularly in Brazil and Mexico   . Its use of phishing links and replication of bank interfaces make it difficult to detect and track. Mitigations should include educating users about phishing techniques and implementing robust security measures to prevent initial infections. The continued evolution and expansion of BBTok highlight the need for ongoing vigilance and proactive measures to protect against this type of malware.