Horabot resurfaces in Mexico with phishing chain that turns infected PCs into email spam hubs


Horabot is back, and researchers say the latest campaign has hit Mexico hard. Kaspersky says the banking trojan uses a fake CAPTCHA page, a multi-stage malware chain, and an email worm that turns each infected machine into a phishing relay. The company found an exposed threat-actor database showing 5,384 victims, with about 93% of them located in Mexico.

The campaign stands out because it relies on user deception instead of a software exploit. Victims land on a fake CAPTCHA page, open the Windows Run dialog, and paste a malicious mshta command themselves. That action pulls down the first-stage HTA loader and starts the infection chain.

Kaspersky says the malware bundle includes a banking trojan, an email spreader, and several obfuscated stages that use JavaScript, VBScript, PowerShell, AutoIt, and an in-memory DLL payload. The company adds that Horabot remains highly active in 2026 and continues to evolve, including updates to its encryption and protocol logic.

This campaign also fits Horabot’s older pattern. Cisco Talos previously described Horabot as a Brazil-linked threat that targets Spanish-speaking users in the Americas, steals credentials, harvests Outlook contacts, and sends phishing emails from victim mailboxes.

What happened

Kaspersky says its MDR team first spotted the campaign after a suspicious mshta execution alert in a customer environment. Endpoint protection stopped the malicious process before the full chain could complete, but the investigation led analysts to the attacker’s infrastructure and the broader campaign.

From there, researchers traced the operation to a fake CAPTCHA page hosted on attacker-controlled infrastructure. The lure told users to paste a command into the Run box, which fetched and executed an HTA file. That HTA then launched a JavaScript payload, followed by heavily obfuscated VBScript stages.

Kaspersky says one of the later scripts collected system details, downloaded AutoIt components, set persistence through a shortcut in the Startup folder, and used PowerShell to reach additional URLs. It then deployed the next stage, which decrypted and loaded the banking trojan into memory.

Fake CAPTCHA page (Source – Securelist)

Why the Mexico wave matters

The victim log Kaspersky found suggests this was not a small test. The exposed page listed infections dating back to May 2025, and 5,030 of the 5,384 recorded victims were in Mexico. The phishing lures researchers collected were written in Spanish and posed as invoices or confidential business files, which matches the regional focus.

Researchers also found clues that point to Brazilian operators. Kaspersky says comments in the code were written in Brazilian Portuguese, and some of the phrasing looked natural enough to suggest a local author rather than copied text. Cisco Talos had earlier reached a similar conclusion, saying the operator likely came from Brazil.

C2 socket address extraction (Source – Securelist)

How the infection chain works

StageWhat happensWhy it matters
Initial lureFake CAPTCHA page tells the user to run an mshta commandThe victim triggers the infection manually
First loaderHTA fetches JavaScript from an attacker domainHelps the attack move past the first step quietly
Obfuscated scriptsVBScript and PowerShell gather data, add persistence, and fetch more filesAdds stealth and flexibility
AutoIt stageAutoIt components decrypt and launch the next payloadPrepares the banking trojan in memory
Final payloadHorabot banking trojan runs and connects to C2Enables credential theft and continued abuse
Email wormMalware sends phishing emails from infected machinesExpands the campaign using trusted inboxes

The broad sequence above comes from Kaspersky’s March 2026 analysis.

What Horabot does after infection

Kaspersky says the malware chain does more than drop a banking trojan. Using PowerShell, the threat can exfiltrate unique email addresses to command-and-control infrastructure and send phishing emails with malicious PDF attachments from selected infected users. Those messages push new targets into the same infection cycle.

Cisco Talos previously said Horabot can control the victim’s Outlook mailbox, collect contact addresses, and send phishing emails to those contacts. Talos also said the malware can steal credentials, operating system details, keystrokes, and one-time banking codes.

That combination makes Horabot more than a simple banking trojan. It acts as a credential stealer, a phishing platform, and a persistence mechanism for future fraud. Each newly infected system can help the campaign grow.

Key signs defenders should watch for

  • Suspicious mshta execution from a user-initiated Run command.
  • Fake CAPTCHA pages that instruct users to paste commands into Windows.
  • Unexpected PowerShell, VBScript, or AutoIt activity chained together.
  • Startup-folder shortcut creation linked to newly dropped files.
  • Outbound phishing emails sent from internal user inboxes.

What organizations should do now

Security teams should block or tightly control HTA execution from untrusted sources and pay close attention to suspicious mshta launches. Kaspersky says defenders should also deploy the published YARA and Suricata rules from its full report, add the listed indicators to blocklists, and train users to distrust fake CAPTCHA pages and invoice-themed attachments.

Kaspersky also recommends stronger anti-spam tuning, caution with unknown attachments, and updated endpoint protection. The company says businesses should combine tooling with human-led detection and threat intelligence because the threat remains active and continues to change.

FAQ

What is Horabot?

Horabot is a malware family linked to banking theft, phishing, and mailbox abuse. Researchers say it can steal credentials, spread through email, and target Spanish-speaking users in the Americas.

Why is the Mexico campaign significant?

Kaspersky found an exposed victim database with 5,384 infections, and about 93% of them were in Mexico. The phishing lures were also written in Spanish and tailored to local targets.

Does Horabot use a software exploit?

Kaspersky’s latest report says the chain starts with a fake CAPTCHA lure that tricks users into running a malicious mshta command themselves. That makes social engineering the main entry point in this campaign.

What makes Horabot dangerous?

It combines banking theft with worm-like phishing spread. Once a system is infected, the malware can help send more malicious emails from the victim’s own mailbox, which makes follow-on messages look more trustworthy.

What should defenders monitor first?

Start with suspicious mshta activity, fake CAPTCHA lures, chained script execution, and unusual mailbox-driven phishing from internal accounts. Those are some of the clearest signals described in the published research.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages