Skip to main content
Mallory

Casbaneiro and Horabot Phishing Campaign Hits Latin America and Europe

phishing-campaign-intelligencecredential-stealer-activityloader-delivery-mechanismcybercrime-service-ecosystemdefense-evasion-method
Updated April 2, 2026 at 07:05 PM2 sources
Share:
Casbaneiro and Horabot Phishing Campaign Hits Latin America and Europe

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

A Brazilian cybercrime group tracked as Augmented Marauder and Water Saci is targeting Spanish-speaking users at organizations across Latin America and Europe with a multi-stage phishing campaign that delivers the Casbaneiro banking trojan and uses Horabot for delivery and propagation. The operation begins with court summons-themed phishing emails carrying password-protected PDF lures that direct victims to malicious links and ZIP archives, leading to execution of HTA and VBS payloads, followed by AutoIt loaders and encrypted malware components.

Researchers said the malware chain includes anti-analysis checks, retrieval of additional payloads from remote servers, and dynamically generated judicial-themed PDF attachments created through a remote PHP API using random PINs. Horabot helps expand the campaign by harvesting Outlook contacts, abusing compromised email accounts, and sending new phishing messages, while the broader operation also incorporates ClickFix social engineering and WhatsApp-based distribution to evade defenses and widen infections.

Timeline

  1. Apr 1, 2026

    Researchers detail Horabot's role in propagation and dynamic PDF lures

    Analysis of the campaign revealed that Horabot was being used both to deliver malware and to propagate the operation by harvesting Outlook contacts, abusing compromised email accounts, and sending phishing emails with dynamically generated judicial-themed PDF attachments. Researchers also found the malware performed anti-analysis checks, retrieved additional payloads from remote servers, and incorporated ClickFix and WhatsApp-based social engineering to expand infections.

  2. Apr 1, 2026

    Augmented Marauder launches Casbaneiro phishing campaign

    A Brazilian cybercrime group tracked as Augmented Marauder, also known as Water Saci, began targeting Spanish-speaking users at organizations across Latin America and Europe with phishing emails delivering the Casbaneiro banking trojan. The campaign used court summons-themed lures, password-protected PDFs, malicious links, ZIP archives, and HTA/VBS payloads in a multi-stage infection chain.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Eternidade Stealer Banking Trojan Propagated via WhatsApp Worm in Brazil

Eternidade Stealer Banking Trojan Propagated via WhatsApp Worm in Brazil

Cybersecurity researchers have identified a new campaign targeting Brazilian users in which the Eternidade Stealer, a Delphi-based banking trojan, is distributed through a WhatsApp worm. The attack leverages social engineering and WhatsApp hijacking, with the threat actor deploying a Python script—marking a shift from previous PowerShell-based methods—to hijack WhatsApp Web sessions and spread malicious attachments. The campaign uses an obfuscated Visual Basic Script as the initial infection vector, which then drops a batch script responsible for delivering two payloads, including the Python-based worm. The malware utilizes the Internet Message Access Protocol (IMAP) to dynamically retrieve command-and-control (C2) addresses, allowing the attacker to update C2 infrastructure as needed. This activity is part of a broader trend in Brazil, where WhatsApp's ubiquity makes it a favored vector for distributing banking trojans and information stealers. The use of Delphi for malware development remains prevalent in Latin America due to its technical efficiency and regional familiarity. Researchers note that this campaign represents an evolution in tactics, building on previous attacks such as Water Saci, and highlights the increasing sophistication of social engineering and malware propagation techniques in the region's cybercrime ecosystem.

1 months ago
JanelaRAT Banking Trojan Expands Attacks on Latin American Financial Users

JanelaRAT Banking Trojan Expands Attacks on Latin American Financial Users

Researchers reported that **JanelaRAT**, a Latin America-focused banking trojan derived from **BX RAT**, is actively targeting online banking and cryptocurrency users, with the heaviest activity in **Brazil** and **Mexico** and additional campaigns observed in **Chile** and **Colombia**. Kaspersky said it recorded **14,739 detections in Brazil** and **11,695 in Mexico** during 2025, as the malware continued to evolve from earlier VBScript-and-ZIP delivery chains to newer phishing-led infections using **MSI droppers**, **DLL sideloading**, obfuscated **.NET** payloads, and persistence through **Startup-folder LNK files**. Recent activity also included deployment of a malicious Chromium extension disguised as legitimate software. Once installed, JanelaRAT monitors browser and window titles for hard-coded banking and financial targets, then opens interactive **TCP** and **HTTP** command-and-control channels to support screenshots, keylogging, input injection, cursor control, remote command execution, and session hijacking. The malware uses encrypted strings, anti-analysis checks, daily rotating dynamic DNS infrastructure, and user inactivity monitoring to evade detection and help operators time fraudulent transactions. A notable feature is its overlay system, which displays fake banking prompts and Windows update screens to steal credentials and **MFA** tokens while suppressing user interaction.

1 weeks ago
AI-Enhanced Python Malware Targets Brazilian Financial Institutions via WhatsApp

AI-Enhanced Python Malware Targets Brazilian Financial Institutions via WhatsApp

A threat campaign known as Water Saci has escalated its attacks on Brazilian financial institutions and cryptocurrency exchanges by deploying a new Python-based malware variant. This campaign leverages artificial intelligence (AI) to convert previous PowerShell propagation scripts into Python, resulting in broader browser compatibility, improved error handling, and faster automation of malware delivery through WhatsApp Web. The attackers use a highly layered attack chain involving multiple file formats such as HTA files, ZIP archives, and PDFs to evade detection and complicate analysis, with the ultimate goal of stealing sensitive data and monitoring user activity on compromised machines. The campaign primarily targets enterprise users of WhatsApp in Brazil, exploiting social engineering tactics to deliver malicious payloads through convincing messages from trusted contacts. Researchers warn that the use of AI-driven code conversion and multi-format delivery methods marks a significant evolution in the threat landscape, making these attacks more sophisticated and harder to detect. While the campaign is currently concentrated in Brazil, there is concern it could expand to other Latin American countries as the techniques continue to evolve.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.