Thursday, May 15, 2025
Homecyber securityThreat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

Published on

SIEM as a Service

Follow Us on Google News

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by threat actors deploying Horabot malware, predominantly targeting Spanish-speaking users in Latin America.

This high-severity threat, detailed in the 2025 Global Threat Landscape Report, exploits malicious HTML files embedded in phishing emails to steal sensitive information, including email credentials and banking data, while propagating through corporate and personal networks.

Active since at least April 2025, the campaign focuses on users in countries such as Mexico, Guatemala, Colombia, Peru, Chile, and Argentina, using culturally tailored emails masquerading as legitimate invoices to deceive victims.

- Advertisement - Google News

Sophisticated Phishing Campaign

The attack begins with a phishing email written in Spanish, often claiming to include a PDF invoice under subject lines like “Factura Adjunta” (Attached Invoice).

Horabot Malware
Phishing email

These emails lure recipients into opening a ZIP attachment containing a malicious HTML file with Base64-encoded data.

Once decoded, the HTML reveals a remote URL that downloads a secondary payload, a ZIP file named “ADJUNTOS_23042025.zip,” housing an HTA file.

According to Fortinet Report, this file employs browser redirection tricks and loads further malicious scripts, initiating a complex infection chain involving VBScript, AutoIt, and PowerShell.

The VBScript, hosted on remote servers, uses custom string decoding to evade static detection, performing tasks like environment checks for antivirus software (e.g., Avast) and virtual machines, alongside creating persistence mechanisms via shortcuts in startup folders.

It also orchestrates data exfiltration by collecting system information-such as IP addresses and usernames-and sending it to command-and-control (C2) servers.

Multi-Stage Attack Chain

Subsequent payloads include an AutoIt script that decrypts a malicious DLL with a hardcoded key, enabling the theft of browser data from applications like Google Chrome, Microsoft Edge, and Opera, while deploying fake pop-up windows to capture login credentials.

Horabot Malware
AutoIt script

Simultaneously, PowerShell scripts exploit Outlook COM automation to harvest email contact lists, filter out specific domains (e.g., Gmail, Hotmail), and send tailored phishing emails with malicious attachments to new victims, ensuring lateral spread within networks.

This self-propagating mechanism, combined with cleanup routines to erase traces, renders Horabot particularly stealthy and challenging to detect as it blends seamlessly with legitimate Windows and Outlook behaviors.

FortiGuard Labs emphasizes the growing sophistication of such phishing attacks, urging organizations to implement robust email filtering, monitor for anomalous file activity, and educate employees on recognizing phishing attempts.

Fortinet’s security solutions, including FortiGate and FortiMail, detect and block this malware under signatures like HTML/Phishing.683A!tr and AutoIt/Agent.HA!tr, offering protection to customers with updated systems.

Additionally, free cybersecurity training from Fortinet is recommended to bolster user awareness.

Indicators of Compromise (IOCs)

TypeValue
Domaint4[.]contactswebaccion[.]store
Domainlabodeguitaup[.]space
IP209[.]74[.]71[.]168
IP93[.]127[.]200[.]211
SHA256 (Script)523d7e9005b2e431068130989caf4a96062a029b50a5455d37a2b88e6d04f83d
SHA256 (AutoIt)25be06643204fc7386db3af84b200d362c3287b30c7491b666c4fe821a8c6eb4

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files

Google Threat Intelligence has unveiled a series of sophisticated threat hunting techniques to detect...

New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution

Adobe has released critical security updates addressing three high-severity vulnerabilities (CVE-2025-30324, CVE-2025-30325, CVE-2025-30326) in...

Severe Adobe Illustrator Flaw Allows Remote Code Execution

Adobe has issued an urgent security update for its widely used graphic design software,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files

Google Threat Intelligence has unveiled a series of sophisticated threat hunting techniques to detect...

New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution

Adobe has released critical security updates addressing three high-severity vulnerabilities (CVE-2025-30324, CVE-2025-30325, CVE-2025-30326) in...
OSZAR »