How to Protect Against JanelaRAT: A Step-by-Step Defense Guide for Latin American Users
A step-by-step guide to defend against JanelaRAT malware targeting Latin America, covering phishing recognition, file handling, system hardening, and monitoring.
Introduction
JanelaRAT, a threat named after the Portuguese word for 'window,' has been actively targeting financial and cryptocurrency data in Latin America since June 2023. This malware, a modified variant of BX RAT, uses a custom title bar detection mechanism to identify banking websites in victims' browsers. Its infection chain evolves continuously, often starting with deceptive emails about pending invoices. Defending against JanelaRAT requires understanding its tactics and implementing a layered security approach. This guide provides actionable steps to protect your systems.

What You Need
- Antivirus software with real-time protection (e.g., Kaspersky, which detects JanelaRAT as Trojan.Script.Generic and Backdoor.MSIL.Agent.gen)
- Updated operating system and browsers
- Email security filters to block phishing attempts
- User awareness training materials on social engineering
- Backup solution for critical data
- Network monitoring tools (optional, for IT teams)
Step-by-Step Guide
Step 1: Recognize Phishing Emails Disguised as Invoice Requests
JanelaRAT campaigns typically begin with emails that mimic pending invoice notifications. These messages urge recipients to click a malicious link to view or download a PDF. Train users to check sender addresses for anomalies, look for urgent or threatening language, and verify invoice requests through a separate communication channel. Never click links or open attachments from unverified senders.
Step 2: Inspect Suspicious Links Before Clicking
If a link seems legitimate, hover over it to view the actual URL. JanelaRAT’s links redirect to websites that automatically download compressed files. Look for misspellings, unusual domains, or different top-level domains (e.g., .xyz instead of .com). Use a link scanner service before clicking.
Step 3: Handle Compressed File Downloads with Caution
The infection chain downloads ZIP archives containing VBScripts, XML files, other ZIPs, and BAT files. Do not extract or run any file from unsolicited downloads. If you must inspect them, use a sandbox or a secure virtual machine. Modern antivirus engines flag these components.
Step 4: Harden Email Client and Attachment Handling
Configure your email client to block executable attachments and script files. Disable automatic download of images and attachments. Consider using email filtering services that scan for malicious patterns, such as those used in JanelaRAT (e.g., MSI files masquerading as installer packages).
Step 5: Monitor for MSI Files and DLL Sideloading Indicators
JanelaRAT’s latest versions use MSI files as initial droppers. These MSI files obfuscate paths and create ActiveX objects to manipulate the system. Check for unusual MSI execution in your logs, especially from unknown sources. DLL sideloading is another critical stage: monitor for legitimate PE32 executables loading suspicious DLLs from temporary directories.
Step 6: Implement Application Whitelisting and Execution Restrictions
Use Group Policies or security software to allow only approved executables to run. JanelaRAT relies on scripts (VBScript, BAT) and sideloading. Disable script execution for users who don’t need it, and restrict the loading of DLLs from user-writable paths.

Source: securelist.com Step 7: Keep Security Software and Signatures Updated
Kaspersky detects JanelaRAT as Trojan.Script.Generic and Backdoor.MSIL.Agent.gen. Ensure your antivirus signatures are up to date. Enable heuristic analysis and behavioral detection to catch zero-day variants. Regularly update all software, especially browser plugins and PDF readers, as these are common entry points.
Step 8: Establish Behavioral Monitoring for Custom Title Bar Detection
JanelaRAT identifies target websites by reading browser title bars. Deploy endpoint detection and response (EDR) solutions that can flag unusual API calls related to window enumeration or title bar manipulation. Alert on processes that repeatedly query window titles across different browser windows.
Step 9: Educate Users on the Evolving Infection Chain
The threat actors behind JanelaRAT continuously streamline their attack. Users must understand that infection chains can change – for example, recent campaigns use fewer steps and new auxiliary files like configuration files. Provide regular, short security updates with real-world examples.
Step 10: Prepare a Response Plan for Suspected Infections
If a system displays signs of JanelaRAT (e.g., unexpected network traffic to Latin American financial sites, unknown scheduled tasks, or newly created startup shortcuts), immediately disconnect from the network. Use offline scanners, review persistence mechanisms (e.g., startup folder, registry run keys), and restore from clean backups. See tips below for additional measures.
Tips for Ongoing Protection
- Backup regularly and test restores. Keep offline copies.
- Use multi-factor authentication on financial and cryptocurrency accounts to mitigate credential theft.
- Restrict local administrator privileges to minimize the impact of DLL sideloading.
- Monitor for unusual file creations in %TEMP% and %APPDATA% directories.
- Deploy network segmentation to limit lateral movement if one system is compromised.
- Stay informed about Latin America-specific threats; JanelaRAT is a regional focus.