A latest discovery by FortiGuard Labs has unveiled a crafty phishing marketing campaign orchestrated by menace actors deploying Horabot malware, predominantly concentrating on Spanish-speaking customers in Latin America.
This high-severity menace, detailed within the 2025 World Risk Panorama Report, exploits malicious HTML recordsdata embedded in phishing emails to steal delicate data, together with e-mail credentials and banking knowledge, whereas propagating by company and private networks.
Lively since at the very least April 2025, the marketing campaign focuses on customers in international locations reminiscent of Mexico, Guatemala, Colombia, Peru, Chile, and Argentina, utilizing culturally tailor-made emails masquerading as authentic invoices to deceive victims.
Refined Phishing Marketing campaign
The assault begins with a phishing e-mail written in Spanish, usually claiming to incorporate a PDF bill below topic traces like “Factura Adjunta” (Connected Bill).

These emails lure recipients into opening a ZIP attachment containing a malicious HTML file with Base64-encoded knowledge.
As soon as decoded, the HTML reveals a distant URL that downloads a secondary payload, a ZIP file named “ADJUNTOS_23042025.zip,” housing an HTA file.
Based on Fortinet Report, this file employs browser redirection methods and masses additional malicious scripts, initiating a posh an infection chain involving VBScript, AutoIt, and PowerShell.
The VBScript, hosted on distant servers, makes use of customized string decoding to evade static detection, performing duties like atmosphere checks for antivirus software program (e.g., Avast) and digital machines, alongside creating persistence mechanisms through shortcuts in startup folders.
It additionally orchestrates knowledge exfiltration by amassing system information-such as IP addresses and usernames-and sending it to command-and-control (C2) servers.
Multi-Stage Assault Chain
Subsequent payloads embody an AutoIt script that decrypts a malicious DLL with a hardcoded key, enabling the theft of browser knowledge from functions like Google Chrome, Microsoft Edge, and Opera, whereas deploying faux pop-up home windows to seize login credentials.

Concurrently, PowerShell scripts exploit Outlook COM automation to reap e-mail contact lists, filter out particular domains (e.g., Gmail, Hotmail), and ship tailor-made phishing emails with malicious attachments to new victims, making certain lateral unfold inside networks.
This self-propagating mechanism, mixed with cleanup routines to erase traces, renders Horabot notably stealthy and difficult to detect because it blends seamlessly with authentic Home windows and Outlook behaviors.
FortiGuard Labs emphasizes the rising sophistication of such phishing assaults, urging organizations to implement sturdy e-mail filtering, monitor for anomalous file exercise, and educate workers on recognizing phishing makes an attempt.
Fortinet’s safety options, together with FortiGate and FortiMail, detect and block this malware below signatures like HTML/Phishing.683A!tr and AutoIt/Agent.HA!tr, providing safety to clients with up to date methods.
Moreover, free cybersecurity coaching from Fortinet is advisable to bolster person consciousness.
Indicators of Compromise (IOCs)
Sort | Worth |
---|---|
Area | t4[.]contactswebaccion[.]retailer |
Area | labodeguitaup[.]house |
IP | 209[.]74[.]71[.]168 |
IP | 93[.]127[.]200[.]211 |
SHA256 (Script) | 523d7e9005b2e431068130989caf4a96062a029b50a5455d37a2b88e6d04f83d |
SHA256 (AutoIt) | 25be06643204fc7386db3af84b200d362c3287b30c7491b666c4fe821a8c6eb4 |
Discover this Information Attention-grabbing! Observe us on Google Information, LinkedIn, & X to Get On the spot Updates!