Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Dynamic PDF Phishing Threatens Latin America and Europe

Dynamic PDF Phishing Threatens Latin America and Europe

Posted on April 1, 2026 By CWS

A recent surge in phishing activities is targeting Spanish-speaking users across organizations in Latin America and Europe. The campaign employs dynamic PDF documents to distribute banking trojans, notably Casbaneiro, also known as Metamorfo. This is achieved through another malware, Horabot, as part of a complex attack strategy by a Brazilian cybercrime group identified as Augmented Marauder and Water Saci, first reported by Trend Micro in October 2025.

Phishing Tactics and Techniques

Security researchers from BlueVoyant, Thomas Elkins and Joshua Green, revealed in a recent analysis that the group’s methods include the use of WhatsApp, ClickFix techniques, and email-centric phishing. These tactics aim to compromise both consumer and enterprise users by leveraging automated scripts and an advanced email-hijacking system.

The phishing attacks begin with emails that mimic court summons, tricking recipients into opening password-protected PDF attachments. These PDFs contain links that lead to malicious downloads, triggering the execution of harmful scripts and payloads. The VBS script, a part of this sequence, conducts checks for security software like Avast before retrieving further malicious files from remote servers.

Unfolding the Attack Chain

Among the downloaded elements are loaders that execute encrypted files, eventually deploying the Casbaneiro and Horabot malware. Casbaneiro, the primary threat, communicates with command-and-control servers, fetching scripts to further spread the malware via phishing emails through compromised Microsoft Outlook accounts.

Horabot facilitates this propagation, creating dynamic PDFs that impersonate official documents. This malware also includes a secondary DLL, targeting major email services such as Yahoo, Live, and Gmail to hijack accounts and send phishing emails.

Continued Evolution of Cyber Threats

Water Saci’s history of using WhatsApp as a vector for banking trojans like Maverick and Casbaneiro demonstrates their adaptive strategies. Recent campaigns highlighted by Kaspersky have utilized the ClickFix tactic to deploy malicious files, underscoring the evolving nature of these threats.

The integration of social engineering with dynamic PDF generation and automated WhatsApp tactics reflects an increasingly sophisticated adversary, capable of circumventing advanced security measures. This multifaceted attack strategy, combining multiple channels like WhatsApp and email with dynamic, user-specific lures, presents a significant challenge to cybersecurity defenses.

As these threats continue to advance, organizations must remain vigilant and adopt robust security measures to protect against such innovative and persistent cybercriminal activities.

The Hacker News Tags:BlueVoyant, Casbaneiro, Cybercrime, Cybersecurity, email phishing, Europe, Horabot, Latin America, PDF lures, Phishing, Trend Micro, Water Saci, WhatsApp, Windows security

Post navigation

Previous Post: Hackers Exploit Critical WebLogic RCE Flaw Rapidly
Next Post: Hasbro Faces Cyberattack Disrupting Operations

Related Posts

Kickstart Your Intelligent Workflow Program with 3 Key Strategies Kickstart Your Intelligent Workflow Program with 3 Key Strategies The Hacker News
Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content The Hacker News
RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware The Hacker News
Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks The Hacker News
Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group The Hacker News
DPRK Cyber Attacks Exploit AI and npm Malware DPRK Cyber Attacks Exploit AI and npm Malware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Grafana Labs GitHub Breach: Codebase Compromised by Hackers
  • Grafana Suffers GitHub Token Breach, Faces Extortion
  • Public macOS Kernel Exploit Found on Apple M5 Chip
  • Critical Flaw in Funnel Builder Targets WooCommerce
  • JDownloader Site Incident: Malicious Installers Found

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Grafana Labs GitHub Breach: Codebase Compromised by Hackers
  • Grafana Suffers GitHub Token Breach, Faces Extortion
  • Public macOS Kernel Exploit Found on Apple M5 Chip
  • Critical Flaw in Funnel Builder Targets WooCommerce
  • JDownloader Site Incident: Malicious Installers Found

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark