Malware & RansomwareHIGH

Horabot Banking Trojan - Resurfaces in Mexico with Tactics

CSCyber Security News
🎯

Basically, a sneaky virus is tricking people in Mexico into stealing their bank info.

Quick Summary

The Horabot banking trojan is back, targeting users in Mexico with clever phishing tactics. Infected machines become phishing relays, increasing the threat. Awareness and proactive measures are essential to combat this layered attack.

What Happened

A notorious banking trojan, Horabot, has re-emerged in Mexico, launching a sophisticated campaign that combines multi-stage infection techniques with an email worm. This malware not only targets users but also turns infected machines into phishing relays, amplifying its reach. The attack begins deceptively with a fake CAPTCHA page, prompting users to execute a malicious command that triggers the infection chain. By using social engineering instead of exploiting software flaws, the attackers turn victims into unwitting accomplices.

Securelist analysts uncovered this campaign after detecting unusual mshta execution alerts within a monitored environment. Their investigation revealed a fake CAPTCHA page linked to an extensive attack chain. They discovered that 5,384 machines had been compromised, with an overwhelming 93% located in Mexico, indicating a focused regional attack. This campaign has been active since at least May 2025, showcasing the attackers' persistence and planning.

Who's Being Targeted

The primary targets of this campaign are users in Mexico, particularly those who may be susceptible to phishing attacks. The phishing emails crafted by the worm masquerade as fake invoices or confidential business documents, specifically designed to deceive Mexican recipients. The trojan, also known as Casbaneiro, Ponteiro, and Metamorfo, employs fake bank overlays to steal sensitive login credentials during banking sessions.

The attackers demonstrate a clear connection to Brazil, as evidenced by comments in the PowerShell code written in Brazilian Portuguese. This regional targeting, coupled with the language used in the phishing emails, suggests a well-planned operation aimed at exploiting local vulnerabilities.

Signs of Infection

Signs of a Horabot infection can be subtle but alarming. Victims may notice unusual activities, such as unexpected emails being sent from their accounts or strange pop-ups during online banking sessions. The trojan employs a multi-stage infection mechanism, where each phase obscures the malware’s true intent. After the initial execution of a malicious HTA file, a JavaScript loader is fetched from an attacker-controlled domain, leading to further obfuscation and the eventual deployment of the banking trojan.

Security teams should remain vigilant for suspicious mshta activities and monitor for any unauthorized access to user accounts. The trojan's ability to harvest contacts from the victim's inbox and send out phishing emails significantly increases the risk of wider infection.

How to Protect Yourself

To safeguard against the Horabot banking trojan, users and organizations should implement several proactive measures. Blocking the execution of HTA files from untrusted sources is crucial, as is monitoring for suspicious activities linked to mshta. Deploying YARA rules for both the Horabot trojan and its AutoIT loader can help detect infections early.

Additionally, users should receive training on recognizing fake CAPTCHA lures and the dangers of malicious PDF attachments. Keeping software up to date and using robust endpoint protection can also mitigate risks. Lastly, organizations should maintain a network blocklist of known attacker-controlled domains to prevent further infections.

🔒 Pro insight: The multi-stage delivery method and reliance on user interaction highlight the need for enhanced user education and endpoint protection strategies.

Original article from

Cyber Security News · Tushar Subhra Dutta

Read Full Article

Related Pings

HIGHMalware & Ransomware

Malware - Google Limits Android Accessibility API Access

Google is tightening access to Android's accessibility API to combat malware abuse. This affects apps not designed for accessibility, reducing risks for users. Enhanced protections aim to safeguard sensitive data from banking Trojans and other malicious software.

Help Net Security·
HIGHMalware & Ransomware

Perseus Malware - New Android Threat Targets User Notes

A new Android malware named Perseus is stealing sensitive information from user notes. It primarily targets financial institutions and crypto services in Turkey and Italy. Users should avoid sideloading apps and ensure their devices are secure.

BleepingComputer·
HIGHMalware & Ransomware

AI in Malware - Analyzing Current Trends and Impacts

Unit 42's latest research reveals how AI is transforming malware. With AI, attackers can create more sophisticated threats, putting users at risk. Stay informed and protected against these evolving dangers.

Palo Alto Unit 42·
HIGHMalware & Ransomware

Malware Alert - Backdoored Open VSX Extension Discovered

A popular code editor extension was found backdoored, silently installing malware on developer machines. Over 26,000 users are at risk. Immediate action is required to secure affected systems.

Cyber Security News·
HIGHMalware & Ransomware

Malware - EDR Killers Become Standard in Ransomware Attacks

Ransomware attackers are now using EDR killers to disable security software before encrypting files. This trend affects many organizations and highlights the need for improved defenses. As ransomware tactics evolve, proactive monitoring and robust controls are essential to protect against these threats.

Help Net Security·
HIGHMalware & Ransomware

Ransomware - Understanding the Exfiltration Playbook

Attackers are using everyday tools to steal data, complicating detection efforts. This shift poses a significant risk to organizations relying on cloud services. The Exfiltration Framework offers insights to help defenders identify these threats effectively.

Cisco Talos Intelligence·