Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是一个网络犯罪团伙,他们用多管齐下的钓鱼活动攻击说西班牙语的用户,目标是拉丁美洲和欧洲的组织。他们使用名为Horabot的恶意软件来传播Windows银行木马Casbaneiro。这个团伙被追踪为Augmented Marauder和Water Saci,由Trend Micro在2025年10月首次记录。 攻击手段包括WhatsApp、ClickFix技术和以电子邮件为中心的钓鱼。钓鱼邮件通常伪装成法院传票,诱使用户点击链接下载恶意文件。这些文件会执行HTA和VBS脚本,进而下载更多恶意软件。 Casbaneiro是主要载荷,而Horabot则用于传播。Horabot通过钓鱼邮件发送给从Outlook中获取的联系人,并利用动态生成的PDF来提高成功率。此外,Horabot还用于垃圾邮件和账户劫持。 总结时要涵盖攻击目标、使用的恶意软件、攻击手段以及传播机制。确保不超过100字,并且直接描述内容,不使用“文章内容总结”之类的开头。 </think> 一个网络犯罪团伙通过多管齐下的钓鱼活动针对拉丁美洲和欧洲的西班牙语用户组织,利用WhatsApp、ClickFix技术和电子邮件进行攻击。其主要目标是传播Windows银行木马Casbaneiro和Horabot恶意软件。该团伙通过伪装成法院传票的钓鱼邮件诱导受害者下载恶意文件,并利用动态生成的PDF和自动化技术进一步传播恶意软件。 2026-4-1 12:36:0 Author: thehackernews.com(查看原文) 阅读量:3 收藏

Malware / Windows Security

A multi-pronged phishing campaign is targeting Spanish-speaking users in organizations across Latin America and Europe to deliver Windows banking trojans like Casbaneiro (aka Metamorfo) via another malware called Horabot.

The activity has been attributed to a Brazilian cybercrime threat actor tracked as Augmented Marauder and Water Saci. The e-crime group was first documented by Trend Micro in October 2025.

"This threat group employs a wider-ranging attack model focused on a bespoke delivery and propagation mechanism that includes WhatsApp, ClickFix techniques, and email-centric phishing," BlueVoyant security researchers Thomas Elkins and Joshua Green said in a technical breakdown published Tuesday.

"It is now evident that while these Brazil-based operators heavily leverage script-based WhatsApp automation to compromise retail and consumer users in Latin America, they concurrently maintain and deploy an advanced, email-hijacking engine to penetrate enterprise perimeters there and Europe as well."

The starting point of the campaign is a phishing email that employs court summons-themed messages to deceive recipients into opening a password-protected PDF attachment. Clicking on an embedded link in the document directs the victim to a malicious link and initiates an automatic download of a ZIP archive, which, in turn, leads to the execution of interim HTML Application (HTA) and VBS payloads.

The VBS script is designed to carry out environment and anti-analysis checks similar to those found in Horabot artifacts, including checks for Avast antivirus software, and proceeds to retrieve next-stage payloads from a remote server. Among the downloaded files are AutoIt-based loaders, each of which extracts and runs encrypted payload files with ".ia" or ".at" extensions to eventually launch two malware families: Casbaneiro ("staticdata.dll") and Horabot ("at.dll").

While Casbaneiro is the primary payload, Horabot is used as a propagation mechanism for the malware. Casbaneiro's Delphi DLL module contacts a command-and-control (C2) server to fetch a PowerShell script that employs Horabot to distribute the malware via phishing emails to harvested contacts from Microsoft Outlook.

"Rather than distributing a static file or hardcoded link as seen in older Horabot campaigns, this script initiates an HTTP POST request to a remote PHP API (hxxps://tt.grupobedfs[.]com/.../gera_pdf.php), passing a randomly generated four-digit PIN," BlueVoyant said.

"The server dynamically forges a bespoke, password-protected PDF impersonating a Spanish judicial summons, which is returned to the infected host. The script then iterates over the filtered email list, utilizing the compromised user's own email account to send a tailored phishing email with the newly generated PDF attached."

Also used in tandem is a secondary Horabot-related DLL ("at.dll") that functions as a spam and account hijacking tool targeting Yahoo, Live, and Gmail accounts to send phishing emails via Outlook. Horabot is assessed to be put to use in attacks targeting Latin America since at least November 2020.

Water Saci has a history of using WhatsApp Web as a distribution vector for disseminating banking trojans like Maverick and Casbaneiro in a worm-like manner. However, recent campaigns highlighted by Kaspersky have leveraged the ClickFix social engineering tactic to dupe users into running malicious HTA files with the end goal of deploying Casbaneiro and the Horabot spreader.

"Taken together, the integration of ClickFix social engineering, alongside dynamic PDF generation and WhatsApp automation, demonstrates an agile adversary that is continually innovating and executing diverse attack paths to bypass modern security controls," the researchers concluded.

"This adversary is maintaining a bifurcated, multi-pronged attack infrastructure, dynamically deploying the WhatsApp-centric Maverick chain and concurrently utilizing both ClickFix and email-based Horabot attack paths."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/casbaneiro-phishing-targets-latin.html
如有侵权请联系:admin#unsafe.sh