Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Dynamic PDF Phishing Threatens Latin America and Europe

Dynamic PDF Phishing Threatens Latin America and Europe

Posted on April 1, 2026 By CWS

A recent surge in phishing activities is targeting Spanish-speaking users across organizations in Latin America and Europe. The campaign employs dynamic PDF documents to distribute banking trojans, notably Casbaneiro, also known as Metamorfo. This is achieved through another malware, Horabot, as part of a complex attack strategy by a Brazilian cybercrime group identified as Augmented Marauder and Water Saci, first reported by Trend Micro in October 2025.

Phishing Tactics and Techniques

Security researchers from BlueVoyant, Thomas Elkins and Joshua Green, revealed in a recent analysis that the group’s methods include the use of WhatsApp, ClickFix techniques, and email-centric phishing. These tactics aim to compromise both consumer and enterprise users by leveraging automated scripts and an advanced email-hijacking system.

The phishing attacks begin with emails that mimic court summons, tricking recipients into opening password-protected PDF attachments. These PDFs contain links that lead to malicious downloads, triggering the execution of harmful scripts and payloads. The VBS script, a part of this sequence, conducts checks for security software like Avast before retrieving further malicious files from remote servers.

Unfolding the Attack Chain

Among the downloaded elements are loaders that execute encrypted files, eventually deploying the Casbaneiro and Horabot malware. Casbaneiro, the primary threat, communicates with command-and-control servers, fetching scripts to further spread the malware via phishing emails through compromised Microsoft Outlook accounts.

Horabot facilitates this propagation, creating dynamic PDFs that impersonate official documents. This malware also includes a secondary DLL, targeting major email services such as Yahoo, Live, and Gmail to hijack accounts and send phishing emails.

Continued Evolution of Cyber Threats

Water Saci’s history of using WhatsApp as a vector for banking trojans like Maverick and Casbaneiro demonstrates their adaptive strategies. Recent campaigns highlighted by Kaspersky have utilized the ClickFix tactic to deploy malicious files, underscoring the evolving nature of these threats.

The integration of social engineering with dynamic PDF generation and automated WhatsApp tactics reflects an increasingly sophisticated adversary, capable of circumventing advanced security measures. This multifaceted attack strategy, combining multiple channels like WhatsApp and email with dynamic, user-specific lures, presents a significant challenge to cybersecurity defenses.

As these threats continue to advance, organizations must remain vigilant and adopt robust security measures to protect against such innovative and persistent cybercriminal activities.

The Hacker News Tags:BlueVoyant, Casbaneiro, Cybercrime, Cybersecurity, email phishing, Europe, Horabot, Latin America, PDF lures, Phishing, Trend Micro, Water Saci, WhatsApp, Windows security

Post navigation

Previous Post: Hackers Exploit Critical WebLogic RCE Flaw Rapidly
Next Post: Hasbro Faces Cyberattack Disrupting Operations

Related Posts

Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool The Hacker News
Silver Fox Intensifies Asia Cyber Campaign with New Trojan Silver Fox Intensifies Asia Cyber Campaign with New Trojan The Hacker News
Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites The Hacker News
Introducing Astrix’s AI Agent Control Plane Introducing Astrix’s AI Agent Control Plane The Hacker News
LeakNet Ransomware Adopts ClickFix for Attacks LeakNet Ransomware Adopts ClickFix for Attacks The Hacker News
CyberArk and HashiCorp Flaws Enable Remote Vault Takeover Without Credentials CyberArk and HashiCorp Flaws Enable Remote Vault Takeover Without Credentials The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • HSBC India Enforces Uppercase-Only Passwords
  • Depthfirst Secures $80M in Series B to Enhance AI Security
  • Google Addresses Critical Chrome Zero-Day Vulnerability
  • Russian Hackers Exploit New CTRL Toolkit for RDP Attacks
  • Hasbro Faces Cyberattack Disrupting Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • HSBC India Enforces Uppercase-Only Passwords
  • Depthfirst Secures $80M in Series B to Enhance AI Security
  • Google Addresses Critical Chrome Zero-Day Vulnerability
  • Russian Hackers Exploit New CTRL Toolkit for RDP Attacks
  • Hasbro Faces Cyberattack Disrupting Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark