Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Dynamic PDF Phishing Threatens Latin America and Europe

Dynamic PDF Phishing Threatens Latin America and Europe

Posted on April 1, 2026 By CWS

A recent surge in phishing activities is targeting Spanish-speaking users across organizations in Latin America and Europe. The campaign employs dynamic PDF documents to distribute banking trojans, notably Casbaneiro, also known as Metamorfo. This is achieved through another malware, Horabot, as part of a complex attack strategy by a Brazilian cybercrime group identified as Augmented Marauder and Water Saci, first reported by Trend Micro in October 2025.

Phishing Tactics and Techniques

Security researchers from BlueVoyant, Thomas Elkins and Joshua Green, revealed in a recent analysis that the group’s methods include the use of WhatsApp, ClickFix techniques, and email-centric phishing. These tactics aim to compromise both consumer and enterprise users by leveraging automated scripts and an advanced email-hijacking system.

The phishing attacks begin with emails that mimic court summons, tricking recipients into opening password-protected PDF attachments. These PDFs contain links that lead to malicious downloads, triggering the execution of harmful scripts and payloads. The VBS script, a part of this sequence, conducts checks for security software like Avast before retrieving further malicious files from remote servers.

Unfolding the Attack Chain

Among the downloaded elements are loaders that execute encrypted files, eventually deploying the Casbaneiro and Horabot malware. Casbaneiro, the primary threat, communicates with command-and-control servers, fetching scripts to further spread the malware via phishing emails through compromised Microsoft Outlook accounts.

Horabot facilitates this propagation, creating dynamic PDFs that impersonate official documents. This malware also includes a secondary DLL, targeting major email services such as Yahoo, Live, and Gmail to hijack accounts and send phishing emails.

Continued Evolution of Cyber Threats

Water Saci’s history of using WhatsApp as a vector for banking trojans like Maverick and Casbaneiro demonstrates their adaptive strategies. Recent campaigns highlighted by Kaspersky have utilized the ClickFix tactic to deploy malicious files, underscoring the evolving nature of these threats.

The integration of social engineering with dynamic PDF generation and automated WhatsApp tactics reflects an increasingly sophisticated adversary, capable of circumventing advanced security measures. This multifaceted attack strategy, combining multiple channels like WhatsApp and email with dynamic, user-specific lures, presents a significant challenge to cybersecurity defenses.

As these threats continue to advance, organizations must remain vigilant and adopt robust security measures to protect against such innovative and persistent cybercriminal activities.

The Hacker News Tags:BlueVoyant, Casbaneiro, Cybercrime, Cybersecurity, email phishing, Europe, Horabot, Latin America, PDF lures, Phishing, Trend Micro, Water Saci, WhatsApp, Windows security

Post navigation

Previous Post: Hackers Exploit Critical WebLogic RCE Flaw Rapidly
Next Post: Hasbro Faces Cyberattack Disrupting Operations

Related Posts

Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time The Hacker News
Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts The Hacker News
Security Flaws in AI Frameworks Expose Sensitive Data Security Flaws in AI Frameworks Expose Sensitive Data The Hacker News
GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module The Hacker News
Filling the Most Common Gaps in Google Workspace Security Filling the Most Common Gaps in Google Workspace Security The Hacker News
Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • EtherRAT Malware Hides Using Ethereum Blockchain
  • FBI Alert on Security Risks from Chinese Mobile Apps
  • Phishing Campaign Impersonates CERT-UA to Spread Malware
  • Magecart Hackers Exploit 100 Domains to Steal Card Data
  • DeepLoad Malware Spreads via ClickFix Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • EtherRAT Malware Hides Using Ethereum Blockchain
  • FBI Alert on Security Risks from Chinese Mobile Apps
  • Phishing Campaign Impersonates CERT-UA to Spread Malware
  • Magecart Hackers Exploit 100 Domains to Steal Card Data
  • DeepLoad Malware Spreads via ClickFix Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark