Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Horabot Trojan Targets Mexico with Phishing Campaign

Horabot Trojan Targets Mexico with Phishing Campaign

Posted on March 19, 2026 By CWS

An active cyber campaign involving the notorious Horabot banking trojan is once again targeting users in Mexico. This campaign employs a sophisticated multi-stage infection process combined with an email worm, transforming compromised systems into phishing relays.

Complex Multi-Stage Infection

The Horabot threat package includes a Delphi-written banking trojan paired with a PowerShell-based spreader, making it one of the most intricate financial cyber threats in Latin America. The attack initiates through a fake CAPTCHA page that misleads users into executing a harmful command via the Windows Run dialog. This trickery avoids exploiting software vulnerabilities, instead manipulating users to run a harmful HTA file, which discreetly sets off the infection chain.

This approach effectively bypasses many endpoint security measures by involving users as unintentional accomplices in their own security breach. Securelist analysts discovered this operation after detecting an unusual mshta execution alert within a client’s network. They traced this activity to a deceptive CAPTCHA page, thoroughly investigating the adversary’s setup.

Widespread Impact and Brazilian Links

During the investigation, researchers uncovered a log on the attacker’s server, revealing 5,384 infected machines, with approximately 93% of them located in Mexico. The records date back to May 2025, indicating a prolonged operation before discovery. There are also distinct connections to Brazil, as evidenced by comments in Brazilian Portuguese within the spreader’s PowerShell code and a Brazilian slang phrase used as an encryption key.

The phishing emails, crafted in Spanish, impersonate invoices or confidential documents to lure Mexican recipients. The Delphi trojan, also known as Casbaneiro and Metamorfo, deceives users with fake banking overlays to capture login credentials during active sessions.

Defensive Measures and Future Outlook

The campaign’s sophistication is highlighted by its elaborate delivery mechanism. Each stage adds a new layer of obfuscation before deploying the final malware. The HTA file retrieves a JavaScript loader from a controlled domain, which then executes an obfuscated VBScript. This script employs server-side polymorphism to thwart signature-based detection mechanisms.

To protect against such threats, security teams should block HTA file executions from untrusted sources and monitor for unusual mshta activities. Implementing YARA rules for both the Horabot Delphi trojan and AutoIT loader, alongside Suricata rules for detecting the unique C2 traffic pattern, will aid in early detection. All indicators of compromise, such as attacker domains and socket addresses, should be promptly added to network blocklists. User education on recognizing fake CAPTCHA lures and suspicious PDF attachments is vital for defense.

Stay updated with the latest cybersecurity news by following us on Google News, LinkedIn, and X. Set CSN as your preferred source in Google for more instant updates.

Cyber Security News Tags:AutoIT, banking trojan, C2 Server, Cybersecurity, Delphi Trojan, email worm, fake CAPTCHA, Horabot, Malware, Mexico, Phishing, PowerShell, Securelist

Post navigation

Previous Post: Critical Vulnerability in ScreenConnect Addressed by Update
Next Post: Russian Cyber Group Targets Ukraine via Zimbra Flaw

Related Posts

M Cryptocurrency Theft Linked to LastPass Password Manager DataBreach $35M Cryptocurrency Theft Linked to LastPass Password Manager DataBreach Cyber Security News
Microsoft Confirms New Outlook Bug Blocking Excel Attachments Microsoft Confirms New Outlook Bug Blocking Excel Attachments Cyber Security News
glibc Vulnerability Exposes Millions of Linux Systems to Code Execution Attacks glibc Vulnerability Exposes Millions of Linux Systems to Code Execution Attacks Cyber Security News
Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscale,r and NetSkope Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscale,r and NetSkope Cyber Security News
Securing Legacy Systems Strategies for Modernizing Old Tech Securing Legacy Systems Strategies for Modernizing Old Tech Cyber Security News
Critical RCE Vulnerabilities in AI inference Engines Exposes Meta, Nvidia and Microsoft Frameworks Critical RCE Vulnerabilities in AI inference Engines Exposes Meta, Nvidia and Microsoft Frameworks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Cyber Group Targets Ukraine via Zimbra Flaw
  • Horabot Trojan Targets Mexico with Phishing Campaign
  • Critical Vulnerability in ScreenConnect Addressed by Update
  • Speagle Malware Exploits Security Software for Data Theft
  • Claude AI Flaws Risk Data Theft and Unsafe Redirects

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Cyber Group Targets Ukraine via Zimbra Flaw
  • Horabot Trojan Targets Mexico with Phishing Campaign
  • Critical Vulnerability in ScreenConnect Addressed by Update
  • Speagle Malware Exploits Security Software for Data Theft
  • Claude AI Flaws Risk Data Theft and Unsafe Redirects

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark