Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails

Posted on May 14, 2025May 14, 2025 By CWS

Could 14, 2025Ravie LakshmananWindows Safety / Risk Intelligence
Cybersecurity researchers have found a brand new phishing marketing campaign that is getting used to distribute malware referred to as Horabot concentrating on Home windows customers in Latin American international locations like Mexico, Guatemala, Colombia, Peru, Chile, and Argentina.
The marketing campaign is “utilizing crafted emails that impersonate invoices or monetary paperwork to trick victims into opening malicious attachments and might steal electronic mail credentials, harvest contact lists, and set up banking trojans,” Fortinet FortiGuard Labs researcher Cara Lin mentioned.
The exercise, noticed by the community safety firm in April 2025, has primarily singled out Spanish-speaking customers. The assaults have additionally been discovered to ship phishing messages from victims’ mailboxes utilizing Outlook COM automation, successfully propagating the malware laterally inside company or private networks.

As well as, the menace actors behind the marketing campaign execute varied VBScript, AutoIt, and PowerShell scripts to conduct system reconnaissance, steal credentials, and drop further payloads.
Horabot was first documented by Cisco Talos in June 2023 as concentrating on Spanish-speaking customers in Latin America since at the least November 2020. It is assessed that the assaults are the work of a menace actor from Brazil.
Then final 12 months, Trustwave SpiderLabs revealed particulars of one other phishing marketing campaign concentrating on the identical area with malicious payloads which it mentioned reveals similarities with that of Horabot malware.

The newest set of assaults begins with a phishing electronic mail that employs invoice-themed lures to entice customers into opening a ZIP archive containing a PDF doc. Nevertheless, in actuality, the connected ZIP file accommodates a malicious HTML file with Base64-encoded HTML knowledge that is designed to achieve out to a distant server and obtain the next-stage payload.
The payload is one other ZIP archive that accommodates an HTML Utility (HTA) file, which is chargeable for loading a script hosted on a distant server. The script then injects an exterior Visible Fundamental Script (VBScript) that performs a sequence of checks that trigger it to terminate if Avast antivirus is put in or it is working in a digital atmosphere.

The VBScript proceeds to gather primary system info, exfiltrate it to a distant server, and retrieves further payloads, together with an AutoIt script that unleashes the banking trojan via a malicious DLL and a PowerShell script that is tasked with spreading the phishing emails after constructing an inventory of goal electronic mail addresses by scanning contact knowledge inside Outlook.
“The malware then proceeds to steal browser-related knowledge from a variety of focused internet browsers, together with Courageous, Yandex, Epic Privateness Browser, Comodo Dragon, Cent Browser, Opera, Microsoft Edge, and Google Chrome,” Lin mentioned. “Along with knowledge theft, Horabot displays the sufferer’s habits and injects faux pop-up home windows designed to seize delicate person login credentials.”

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:American, Emails, Horabot, InvoiceThemed, Latin, Malware, Nations, Phishing, Targets

Post navigation

Previous Post: Vulnerabilities Patched by Juniper, VMware and Zoom 
Next Post: Why Offensive Security Training Benefits Your Entire Security Team

Related Posts

Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More The Hacker News
Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android The Hacker News
BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan The Hacker News
Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering The Hacker News
Anubis Ransomware Encrypts and Wipes Files, Making Recovery Impossible Even After Payment The Hacker News
Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News