Water Saci's TCLBANKER Worm Hits 59 Financial Platforms via WhatsApp and Outlook
Water Saci's newest campaign deploys TCLBANKER across 59 Brazilian financial platforms using a WhatsApp Web worm capable of sending malicious installers to 3,000 contacts per compromised device and a parallel Outlook email bot that hijacks victims' own authenticated sessions to spread the infection through their trusted contact lists — Elastic Security Labs confirmed the group is still hardening the toolkit with active debug artifacts present as of May 8, 2026.
**Water Saci TCLBANKER banking trojan** represents the third major malware generation from Brazil's most prolific banking threat group. Elastic Security Labs identified the campaign on May 8, 2026 under the tracking identifier REF3076, while Trend Micro attributes the activity to Water Saci — a financially motivated, Brazilian-based operator cluster documented since July 2019. TCLBANKER is an architectural evolution of the Maverick and SORVEPOTEL malware families, maintaining the core credential-harvesting objective while adding dual-worm propagation, .NET Reactor-protected loaders, and an anti-analysis watchdog subsystem that monitors for 13 specific reverse-engineering tools including x64dbg, IDA Pro, and Ghidra.
The technical delivery mechanism exploits DLL side-loading against logiaipromptbuilder.exe, a legitimately signed Logitech binary included in the Logitech AI Prompt Builder installation package. The malicious MSI installer drops a trojanized DLL alongside the signed binary, executing in the context of a trusted process signature. Before deploying the main payload, the loader validates six environmental conditions: Brazilian Portuguese locale, a UTC timezone between -5.0 and -2.0, at least 64GB of disk space, at least 2GB of RAM, at least 2 CPU cores, and no active virtualization environment. These checks eliminate sandbox detonation and ensure the banking trojan only activates against genuine Brazilian financial users.
Any organization operating Brazilian financial services, fintech infrastructure, or cryptocurrency exchanges with Portuguese-speaking employees should treat TCLBANKER as an active threat requiring immediate indicator scanning. The worm propagation model means every infected employee generates thousands of additional targeted delivery attempts, expanding the attack surface with no additional effort from Water Saci operators.
Briefings like this, every morning before 9am.
Threat intel, active CVEs, and campaign alerts — distilled for practitioners. 50,000+ subscribers. No noise.
Who Is Water Saci?
**Water Saci** is a financially motivated cybercriminal group based in Brazil, assessed by Trend Micro as active since at least July 2019. The name references Saci-Pererê, a figure from Brazilian folklore, consistent with security researchers' practice of naming Brazilian threat actors after regional cultural elements. Analysis of command-line artifacts across Water Saci tools confirms native Portuguese-speaking operators working exclusively on Brazilian targets, with no documented campaigns against non-Brazilian organizations in seven years of activity.
The group maintains a sustained development pipeline. Water Saci's malware has passed through at least three documented generations: the original SORVEPOTEL family, which used browser overlay techniques to harvest credentials from approximately 30 financial institutions; the November 2025 Maverick campaign, which added WhatsApp Web worm propagation and expanded targeting to approximately 45 platforms; and now TCLBANKER, which adds the Outlook email bot and brings the monitored financial platform count to 59. In late 2025, Trend Micro documented Water Saci using AI tools to convert PowerShell propagation routines into Python variants, producing functional malware iterations in days rather than weeks. For context on the broader trend of AI-assisted malware development by financially motivated actors, see the [Slopoly AI-generated malware analysis from Hive0163](/blog/slopoly-ai-generated-malware-hive0163-interlock-ransomware).
Water Saci has faced no public indictments, sanctions, or law enforcement disruptions as of May 2026. The group has accumulated a campaign history across more than 1,000 affected companies and 1.5 million compromised individuals according to Trend Micro telemetry. TCLBANKER's discovery in early operational stages, with debug logging paths and test process names still present in production binaries, suggests Water Saci expects significant future campaign expansion, not wind-down.
“REF3076 appears to be in early operational stages, with debug logging paths, test process names, and an incomplete phishing site present in the code, indicating the campaign is still being fleshed out and could further evolve over time.”
Elastic Security Labs — TCLBANKER analysis, May 8, 2026
How Does TCLBANKER's Banking Trojan Module Work?
**TCLBANKER** deploys a full-featured banking trojan after DLL side-loading and anti-analysis validation succeed. The core module monitors browser address bars across Chrome, Firefox, Edge, Brave, Opera, and Vivaldi for URLs matching any of 59 hardcoded financial institution domains. When a match is detected, the trojan deploys a WPF-based full-screen overlay covering the legitimate banking session.
The overlay framework handles credential theft across three display modes. A phone and PIN input mode renders Brazilian-format masked input fields, collecting banking authentication codes. A vishing wait screen displays a fake "Estamos entrando em contato" message, pausing the victim while operators conduct a real-time phone fraud call. A fake Windows Update progress animation runs for approximately 15 minutes with randomized percentage increments, maintaining victim confidence during exfiltration. All overlays use the Windows WDA_EXCLUDEFROMCAPTURE API flag, making them invisible to screenshot tools and screen recording software — a technique that defeats incident response attempts to document credential theft in progress.
Beyond credential harvesting, TCLBANKER provides operators with complete remote control. The C2 connection runs over WebSocket to Cloudflare Workers infrastructure and supports 16 opcodes including screenshot capture, continuous screen streaming, keylogging, clipboard interception, process enumeration, and full mouse and keyboard remote control. The campaign GUID 70e4f943-e323-4484-97d7-35401bf6812c serves as an HMAC-SHA256 signing key for C2 authentication. Operators access credentials in real time without waiting for exfiltration, combining overlay fraud with live operator monitoring for maximum yield per infected session.
The anti-analysis subsystem runs in parallel with trojan operations. Six anti-debugging implementations check PEB BeingDebugged flags, heap tail flags, ProcessDebugPort handles, hardware breakpoint registers DR0 through DR3, performance counter delta timing, and DbgUiRemoteBreakin function patching. ETW telemetry is patched via xor eax, eax; ret instruction injection, eliminating the kernel logging channel that most endpoint detection tools rely on for behavioral alerts. For context on how credential-theft campaigns chain browser session access into downstream financial fraud, see the analysis of [malicious Chrome extensions stealing OAuth2 tokens](/blog/malicious-chrome-extensions-oauth2-token-theft).
How Does the Water Saci TCLBANKER Attack Chain Spread?
Water Saci operates a five-stage attack chain from initial delivery through worm propagation, with each stage mapped to documented MITRE ATT&CK techniques.
Initial Delivery — T1566.001: Phishing Spearphishing Attachment
The victim receives or downloads a ZIP file containing a malicious MSI installer disguised as the Logitech LogiAI Prompt Builder. Water Saci distributes the initial payload through phishing lures targeting Brazilian users. Once TCLBANKER is active on a device, the worm module generates additional distribution through the victim's own WhatsApp and Outlook accounts, requiring no further effort from operators.
DLL Side-Loading — T1574.002: Hijack Execution Flow
The MSI installer places a malicious DLL in the Logitech AI installation directory alongside logiaipromptbuilder.exe, a legitimately signed binary. Windows loads the malicious DLL in the context of the trusted Logitech process, bypassing application control policies that trust signed executables. The .NET Reactor-protected loader validates six environmental fingerprints before decrypting and executing the payload, defeating sandboxes and analysis environments.
Persistence and C2 — T1053.005: Scheduled Task
TCLBANKER creates a scheduled task named RuntimeOptimizeService with a logon trigger using Task Scheduler COM interop, executing from %LocalAppData%\LogiAI. A SHA-256 hash-based version-tracking mechanism enables self-update when the C2 pushes a newer build. C2 communication runs over authenticated WebSocket to Cloudflare Workers endpoints using HMAC-SHA256 signing.
Credential Harvesting — T1056.003: Web Portal Capture + T1185: Browser Session Hijacking
The banking trojan module monitors browser URL activity across six major browsers and deploys WPF overlay screens on matches to 59 target financial domains. Overlays block keyboard escape controls including Tab, Escape, Alt+F4, and PrintScreen, and are hidden from screen capture APIs via WDA_EXCLUDEFROMCAPTURE. Operators access live sessions via the 16-opcode C2 channel for real-time supervised fraud, reading credentials as they are entered rather than waiting for batch exfiltration.
Worm Propagation — T1570: Lateral Tool Transfer via WPPConnect and Outlook Bot
The worm module automates a WhatsApp Web session using the WppConnect framework, harvests up to 3,000 Brazilian contacts, and sends each a malicious ZIP payload. The Outlook email bot simultaneously enumerates the victim's Outlook contact list and sends phishing emails from the victim's authenticated account. Both propagation channels exploit existing trust relationships, with recipients seeing messages from known senders' legitimate accounts.
Which Financial Platforms Does Water Saci Target?
TCLBANKER monitors 59 Brazilian banking, fintech, and cryptocurrency platforms, with target URLs encoded within the malware binary via XOR with a 16-byte key. Prior Water Saci campaigns documented by Trend Micro confirm explicit targeting of Santander Brazil, Banco do Brasil, Caixa Econômica Federal, Sicredi, and Bradesco — five of Brazil's largest retail banking institutions. The 59-platform count represents an increase from approximately 45 platforms targeted in the November 2025 Maverick variant and roughly 30 in the original SORVEPOTEL campaigns.
Fintech and cryptocurrency platforms constitute the growth area in Water Saci targeting. Brazil hosts one of the largest cryptocurrency retail markets in Latin America, and fintech adoption among Brazilian consumers ranks among the highest in the region. Water Saci's pattern of expanding its target list with each malware generation suggests the 59-platform figure will increase as TCLBANKER matures from its current early operational stage.
The worm propagation math amplifies targeting risk beyond direct infections. A single compromised employee in a 50-person finance team triggers TCLBANKER, which messages up to 3,000 WhatsApp contacts and the entire Outlook contact list simultaneously. Recipients receive those messages from a trusted contact's authenticated account, removing the primary signal people use to reject phishing. Organizational risk scales with the infected employee's contact network size, not solely with the number of directly targeted users.
The language gate provides some geographic protection. TCLBANKER validates Brazilian Portuguese locale (LANGID 0x0416) and UTC timezone alignment between -5.0 and -2.0 hours before activating the main payload. Organizations outside Brazil with no Portuguese-speaking employees on Brazilian-timezone systems face minimal direct exposure, but any organization maintaining Brazilian subsidiaries, employees, or banking relationships should assess TCLBANKER risk directly.
TCLBANKER Indicators of Compromise
Elastic Security Labs published the following confirmed indicators from REF3076 analysis as of May 8, 2026. The entire campaign infrastructure uses a single Cloudflare Workers account identified as ef971a42. Blocking all *.ef971a42.workers.dev subdomains at your DNS resolver or web proxy severs C2 communication and breaks the campaign update mechanism in a single control.
The development artifact path C:\temp\tcl-debug.txt hardcoded in TCLBANKER binaries confirms debug artifacts remain in production builds, providing a reliable static analysis signal. The scheduled task named RuntimeOptimizeService combined with an installation path under %LocalAppData%\LogiAI and no corresponding legitimate Logitech AI installation is a definitive behavioral indicator of active infection.
Elastic's YARA rule Windows.Trojan.TCLBanker and prevention rules including "NTDLL Memory Protection Change via Unsigned DLL," "NTDLL library loaded for a second time," and "Potential NTDLL Memory Unhooking" are available through the Elastic Security detection rules repository on GitHub.
Subscribe to unlock Indicators of Compromise
Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.
How Do You Detect and Block TCLBANKER?
Elastic Security Labs released detection rules for TCLBANKER available in the Elastic Security detection engine. The combination of ntdll unhooking behavior, ETW patching, and DLL side-loading from a Logitech installation path creates distinctive behavioral signals that modern EDR platforms can detect when properly configured. The critical detection gap: TCLBANKER validates all anti-sandbox checks before generating any behavioral activity. Sandbox environments running samples for two to three minutes may observe no malicious behavior. Allow sandbox execution through the full 450ms timing baseline before classifying a sample as benign.
Defender priorities in order of implementation speed and coverage:
Subscribe to unlock Remediation & Mitigation steps
Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.
Why Water Saci TCLBANKER Matters for Your Organization
Water Saci TCLBANKER banking trojan is the most technically sophisticated iteration of a seven-year-old financially motivated campaign that has never been disrupted by law enforcement. Three factors make this campaign materially different from standard banking fraud operations.
The dual-worm propagation model breaks traditional phishing economics. Standard phishing campaigns require Water Saci to maintain distribution infrastructure and accept high delivery failure rates. TCLBANKER converts every infected device into a self-funded distribution node, sending infection attempts from the victim's authenticated accounts to their existing contact network. Recipients apply zero skepticism to messages from known contacts. The infection chain exploits earned trust rather than fabricating it.
The WPF overlay framework defeats the primary user defense against banking fraud: recognizing when a website looks wrong. TCLBANKER never presents a fake website. It renders a full-screen WPF window over the real, legitimate banking session, with the genuine bank interface visible through cutout regions. Users authenticate to the real bank while TCLBANKER captures credentials through the overlay. The WDA_EXCLUDEFROMCAPTURE flag makes the overlay invisible to screenshot tools, meaning users and incident responders cannot document what the victim saw during the session.
The early operational stage is the risk accelerator here. Elastic Security Labs confirmed debug artifacts still present in TCLBANKER production binaries as of May 8, 2026, including test process names and the hardcoded log path C:\temp\tcl-debug.txt. Water Saci's development cadence across prior campaigns shows these artifacts disappear as campaigns mature and scale. Organizations that respond now face a significantly smaller attack surface than those waiting for the campaign to exit early stages.
Subscribe to unlock Remediation & Mitigation steps
Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.
The bottom line
Water Saci TCLBANKER banking trojan has just entered its operational expansion phase, targeting 59 Brazilian financial platforms through a WhatsApp-and-Outlook worm that converts victims into unwilling distribution nodes against their own 3,000-person contact networks. Three takeaways: TCLBANKER's DLL side-loading against signed Logitech software bypasses application control policies that trust signed executables; the WDA_EXCLUDEFROMCAPTURE overlay flag makes active credential theft invisible to screenshot investigation; and Water Saci's confirmed debug artifacts mean the campaign will only grow more sophisticated from this point. Block *.ef971a42.workers.dev at your DNS resolver and search for RuntimeOptimizeService scheduled tasks on every Windows endpoint before this week ends.
Frequently asked questions
What is Water Saci?
Water Saci is a financially motivated cybercriminal group based in Brazil, operational since at least July 2019. The group targets Brazilian financial institutions, fintech platforms, and cryptocurrency exchanges exclusively, with all documented campaigns language-gated to Brazilian Portuguese. Trend Micro tracks the group under the Water Saci name, while Elastic Security Labs identifies the latest campaign as REF3076. Water Saci has accumulated a history of more than 1,000 affected companies and 1.5 million compromised individuals across seven years of activity with no confirmed law enforcement disruption. The group actively uses AI tools to accelerate malware development, with documented conversion of PowerShell propagation modules to Python variants in late 2025.
How does TCLBANKER spread through WhatsApp?
TCLBANKER uses the WppConnect open-source framework to automate a WhatsApp Web browser session on the compromised device. The malware accesses the victim's active WhatsApp session, enumerates up to 3,000 contacts from their address book, and sends each contact a malicious ZIP file containing the TCLBANKER MSI installer. Recipients see the message as originating from a known contact's legitimate account, removing the primary signal people use to identify phishing attempts. The propagation only targets Brazilian phone numbers, maintaining the group's geographic focus. Disabling WhatsApp Web on corporate devices or blocking auto-download of ZIP and MSI files prevents worm delivery through this channel.
Which banks and financial platforms does TCLBANKER target?
TCLBANKER monitors 59 Brazilian banking, fintech, and cryptocurrency platform URLs encoded within the malware. Confirmed targets from prior Water Saci campaigns include Santander Brazil, Banco do Brasil, Caixa Econômica Federal, Sicredi, and Bradesco. The current TCLBANKER 59-platform list has not been fully decoded in open source reporting as of May 2026, but represents an increase from approximately 45 platforms in the November 2025 Maverick variant. Fintech platforms and cryptocurrency exchanges constitute the growth area in targeting, consistent with Brazil's high digital financial services adoption. Any Brazilian financial institution or crypto exchange should assume their platform is included in the TCLBANKER monitoring list.
How do I detect TCLBANKER malware on my systems?
Six detection methods apply. Deploy Elastic Security Labs YARA rule Windows.Trojan.TCLBanker for static file detection across Windows endpoints. Alert on scheduled tasks named RuntimeOptimizeService executing from %LocalAppData%\LogiAI with no corresponding legitimate Logitech AI installation. Enable Elastic prevention rule 'NTDLL Memory Protection Change via Unsigned DLL' for behavioral detection of the ntdll unhooking technique. Block and monitor all *.ef971a42.workers.dev Cloudflare Workers subdomains for network egress. Search for WebSocket connections to mxtestacionamentos.com from Windows processes. Alert on WppConnect module loading on corporate endpoints where WhatsApp Web automation is not a legitimate business application.
Has Water Saci been arrested or indicted?
No public arrests, indictments, or sanctions targeting Water Saci operators have been issued as of May 2026. The group has operated continuously since July 2019 across multiple documented malware generations with no confirmed law enforcement disruption. Brazilian law enforcement has historically pursued banking trojan operators, with operations such as Operation Lavoz targeting similar Brazilian banking malware actors in prior years, but no public action specifically naming Water Saci has emerged. Seven years of documented activity with no disruption suggests the group operates with effective impunity, likely from within Brazil's jurisdiction.
What is the difference between TCLBANKER, SORVEPOTEL, and Maverick?
TCLBANKER, SORVEPOTEL, and Maverick are three generations of the same Water Saci banking trojan family. SORVEPOTEL was the original family targeting approximately 30 Brazilian financial institutions using browser overlay credential harvesting. Maverick, documented by Trend Micro in November 2025, added WhatsApp Web worm propagation and expanded targeting to approximately 45 platforms. TCLBANKER, identified by Elastic Security Labs in May 2026 as REF3076, adds a parallel Outlook email bot worm component, expands to 59 financial platforms, and introduces .NET Reactor loader protection with a six-check anti-analysis fingerprinting gate. Each generation retains the WPF overlay credential theft mechanism while adding more sophisticated delivery and propagation.
How does TCLBANKER evade security tools and antivirus detection?
TCLBANKER employs eight evasion layers. The .NET Reactor-protected loader requires a fingerprinting hash validating Brazilian locale and hardware specifications before decrypting the payload, defeating sandboxes without matching environmental conditions. A watchdog subsystem continuously monitors for 13 analysis tools including x64dbg, IDA Pro, Ghidra, and dnSpy by process name, window title, and module names. ETW telemetry is patched by injecting xor eax, eax; ret instructions, eliminating the kernel logging channel most endpoint detection products rely on for behavioral alerts. ntdll.dll is unhooked from disk, removing userspace API monitoring hooks. Six anti-debugging checks verify no debugger is attached. Hypervisor detection rejects all major virtualization platforms. A 450ms sleep baseline defeats timing-based sandbox detection. The WPF overlay uses WDA_EXCLUDEFROMCAPTURE to hide from screenshot tools.
What sectors does Water Saci target beyond retail banking?
Water Saci's documented targeting focuses on the Brazilian financial services sector including retail banking, fintech, and cryptocurrency exchanges. Prior Trend Micro reporting also identifies telecommunications and e-commerce companies within Brazil as secondary targets, consistent with the group's interest in obtaining financial account credentials and payment data. The group does not target government entities, critical infrastructure, or non-Brazilian organizations based on seven years of documented campaign data. TCLBANKER's language gate enforcing Brazilian Portuguese locale and Brazil-region timezone confirmation is the primary control keeping targeting geographically bounded to Brazilian users.
Sources & references
- Elastic Security Labs — TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook
- The Hacker News — TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms
- Trend Micro — Unraveling Water Saci's New Multi-Format, AI-Enhanced Attacks Propagated via WhatsApp
- MITRE ATT&CK — Techniques Library
- CybersecurityNews — Hackers Abuse Signed Logitech Installer to Deploy TCLBANKER Banking Trojan
Free resources
Critical CVE Reference Card 2025–2026
25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.
Ransomware Incident Response Playbook
Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.
Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
