FraudHIGH

Casbaneiro Phishing Targets Latin America and Europe

Featured image for Casbaneiro Phishing Targets Latin America and Europe
THThe Hacker News
CasbaneiroHorabotAugmented MarauderWater Saciphishing
🎯

Basically, hackers are tricking people into opening fake court documents to steal their banking info.

Quick Summary

A new phishing campaign is targeting Spanish-speaking users in Latin America and Europe, delivering banking trojans via dynamic PDFs. This sophisticated attack employs social engineering tactics to compromise victims. Users should remain vigilant and take precautions against such threats.

What Happened

A multi-pronged phishing campaign has emerged, targeting Spanish-speaking users in organizations across Latin America and Europe. This campaign aims to deliver Windows banking trojans, specifically Casbaneiro (also known as Metamorfo), through another malware called Horabot. The Brazilian cybercrime group behind this operation is tracked under the aliases Augmented Marauder and Water Saci. They have been active since at least October 2025, employing various tactics to compromise users.

The attack begins with a phishing email that uses court summons-themed messages to lure victims into opening a password-protected PDF attachment. Once the PDF is opened, it contains a link that directs users to a malicious site, triggering the download of a ZIP archive. This archive executes interim HTML Application (HTA) and VBS payloads designed to check the victim's environment for security software and download further malicious components.

Who's Being Targeted

The primary targets of this campaign are Spanish-speaking users across various organizations in Latin America and Europe. The attackers leverage WhatsApp and email as their primary delivery mechanisms. By using script-based WhatsApp automation, they can effectively compromise retail and consumer users while also targeting enterprise environments through sophisticated email hijacking techniques.

This dual approach allows the attackers to maximize their reach and effectiveness. The use of dynamic PDF generation and ClickFix social engineering tactics demonstrates their adaptability and innovation in bypassing modern security measures.

Signs of Infection

Victims may notice several signs indicating a potential infection. These include receiving unexpected emails with court summons attachments, unusual activity in their email accounts, or the presence of unknown files on their systems. The VBS script used in this campaign performs checks for antivirus software, which can indicate a more sophisticated threat.

Additionally, the malware can propagate itself by sending phishing emails from compromised accounts, making it harder for victims to recognize the threat. Users should be vigilant about any suspicious emails or attachments, especially those that seem to come from trusted contacts.

How to Protect Yourself

To safeguard against this phishing campaign, users should take several proactive measures:

  • Do not open unexpected email attachments, especially those that are password-protected.
  • Verify the sender's email address before clicking on any links or downloading files.
  • Use updated antivirus software to help detect and block malware.
  • Educate yourself and your team about phishing tactics and how to recognize suspicious communications.

By implementing these strategies, individuals and organizations can significantly reduce their risk of falling victim to this evolving threat landscape. The integration of multiple attack vectors by the Augmented Marauder group highlights the importance of staying informed and vigilant in cybersecurity practices.

🔒 Pro insight: The use of dynamic PDF generation and WhatsApp automation indicates a significant evolution in phishing tactics, making detection increasingly challenging.

Original article from

THThe Hacker News
Read Full Article

Related Pings

HIGHFraud

April Fools' Day - Why We're Avoiding the Jokes

This April Fools' Day, we're avoiding jokes due to the rise of convincing scams. Many people struggle to differentiate between pranks and scams. Stay cautious and protect yourself from potential fraud.

Malwarebytes Labs·
HIGHFraud

US Charges Uranium Crypto Exchange Hacker for $55M Theft

Jonathan Spalletta has been charged for stealing $55 million from Uranium Finance. This hack led to the exchange's shutdown, raising alarms about DeFi security. Users must be cautious as the DeFi landscape evolves.

SecurityWeek·
HIGHFraud

Hotel Booking Scam - Hackers Target Guests with Fraudulent Requests

A new scam is targeting travelers by hijacking hotel booking systems. Cybercriminals send fake payment requests via WhatsApp, tricking guests into revealing sensitive information. Awareness and caution are essential to avoid falling victim to this fraud.

Cyber Security News·
HIGHFraud

Phishing Campaign - Targeting Philippine Banking Users Uncovered

A phishing campaign targeting Philippine banks has been uncovered. Users are at risk of credential theft due to hijacked domains. This escalation threatens online banking security and user trust.

Group-IB Blog·
MEDIUMFraud

Ukrainian CERT-Spoofing Phishing Campaign Delivers RAT

A new phishing campaign is impersonating Ukraine's CERT to deliver malware. Various sectors are targeted, with limited success reported. Stay alert to protect sensitive data.

SC Media·
HIGHFraud

Maryland Man Charged in $53 Million Uranium Finance Heist

Jonathan Spalletta faces charges for hacking Uranium Finance, stealing over $53 million and laundering the proceeds through crypto mixers.

SC Media·