Unpacking Augmented Marauder’s Multi-Pronged Casbaneiro Campaigns
BlueVoyant researchers have uncovered a broad, multi-pronged phishing campaign targeting Spanish-speaking users in organizations across Latin America and now Europe as well. While recent industry intelligence heavily documented attacks utilizing WhatsApp to deliver banking trojans under the umbrella of the Brazil-based eCrime group Augmented Marauder (a.k.a. Water Saci)
AI Analysis
Technical Summary
Researchers at BlueVoyant have uncovered a broad, multi-pronged phishing campaign orchestrated by the Brazil-based eCrime group Augmented Marauder (also known as Water Saci). This campaign targets Spanish-speaking users in organizations across Latin America and has recently expanded into Europe. The attackers use phishing messages, including those delivered via WhatsApp, to distribute the Casbaneiro banking trojan, a malware family designed to steal banking credentials and perform fraudulent transactions. The campaign employs multiple vectors and malicious domains such as facturastbs.shop and grupobedfs.com to host payloads and phishing pages. The malware is delivered through social engineering tactics that trick users into clicking malicious links or opening infected attachments. The campaign's multi-pronged nature increases its reach and effectiveness, targeting a wide range of organizations with Spanish-speaking personnel. Although there are no known CVEs or public exploits associated with this campaign, the presence of numerous malware hashes and URLs provides actionable indicators of compromise. The campaign reflects a continuation of Augmented Marauder's focus on financial crime, leveraging phishing and trojan malware to compromise victims. The threat intelligence is shared under TLP: White, allowing broad dissemination for defensive purposes.
Potential Impact
This campaign poses a significant risk to organizations with Spanish-speaking employees, especially financial institutions and enterprises in Latin America and Europe. Successful infections can lead to credential theft, unauthorized access to banking accounts, and financial fraud, resulting in direct monetary losses. Beyond financial damage, compromised systems may be used for further lateral movement or data exfiltration, impacting confidentiality and integrity. The use of WhatsApp and other messaging platforms as delivery vectors increases the likelihood of user interaction and infection. Organizations lacking robust phishing defenses or user awareness training are particularly vulnerable. The campaign's expansion into Europe indicates a growing geographic scope, potentially affecting multinational companies and financial services providers. While the campaign is rated medium severity, the financial and reputational damage from successful intrusions can be substantial. The lack of known exploits in the wild suggests the threat is still emerging, offering a window for proactive defense.
Mitigation Recommendations
1. Implement targeted phishing awareness training focused on recognizing social engineering tactics used in this campaign, including suspicious WhatsApp messages and email links. 2. Deploy advanced email and messaging security solutions capable of detecting and blocking phishing URLs and malicious attachments, including sandboxing suspicious files. 3. Block known malicious domains and URLs associated with the campaign (e.g., facturastbs.shop, grupobedfs.com) at network perimeter and DNS levels. 4. Monitor network traffic for connections to identified malicious IPs and domains and investigate any anomalies. 5. Enforce multi-factor authentication (MFA) on all financial and critical systems to reduce impact if credentials are compromised. 6. Regularly update endpoint protection platforms with the latest threat intelligence and malware signatures. 7. Conduct incident response exercises simulating phishing attacks to improve detection and containment capabilities. 8. Encourage users to verify unexpected financial or invoice-related communications through independent channels before taking action. 9. Collaborate with regional cybersecurity organizations to share intelligence and stay updated on evolving tactics used by Augmented Marauder. 10. Review and harden WhatsApp and other messaging platform usage policies to limit exposure to unsolicited messages from unknown contacts.
Affected Countries
Brazil, Mexico, Argentina, Chile, Colombia, Peru, Spain, Portugal
Indicators of Compromise
- hash: aec9ed01b85713acc6a7f1da4d94ee1b
- hash: a5eacd9028639a7b148b66de168037c3cea78ecf
- hash: 1693448804bf1c90ad7317af250bcd6ea021256e33e983b224aea81d4ecc2e20
- hash: 1af69a3283e28a8cc9a11819ecc2f2cff46dcabbfa78cefc71a02b881a064593
- hash: 239cb9232fe01c8b82eb627f66acc6848cb223dfea46d4923844c1fe20f1de49
- hash: 3e4002c7f0909d3c743b3586098e248d413f485c6bb033cafdb322bd8b206ebb
- hash: 4e08a1525a62a387595a2e4942b56ec3f3b3259996115ea2e6ea3638ccb87705
- hash: 69fc15919044fc6a94bb251afd90a0a07204b79df3bc62c49ba6b0febefbc33e
- hash: b56d00addd6c6a266de3c739dad22aa1de52624066544929754d47332257cba6
- hash: d1d08f7e44641d921fad22ed175b928c696befd14a55271eb203f8fcaff553d5
- url: https://cgf.facturastbs.shop/a/08/150822/au
- url: https://tt.grupobedfs.com/.../gera_pdf.php
- domain: facturastbs.shop
- domain: grupobedfs.com
- domain: cgf.facturastbs.shop
- domain: tt.grupobedfs.com
Unpacking Augmented Marauder’s Multi-Pronged Casbaneiro Campaigns
Description
BlueVoyant researchers have uncovered a broad, multi-pronged phishing campaign targeting Spanish-speaking users in organizations across Latin America and now Europe as well. While recent industry intelligence heavily documented attacks utilizing WhatsApp to deliver banking trojans under the umbrella of the Brazil-based eCrime group Augmented Marauder (a.k.a. Water Saci)
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Researchers at BlueVoyant have uncovered a broad, multi-pronged phishing campaign orchestrated by the Brazil-based eCrime group Augmented Marauder (also known as Water Saci). This campaign targets Spanish-speaking users in organizations across Latin America and has recently expanded into Europe. The attackers use phishing messages, including those delivered via WhatsApp, to distribute the Casbaneiro banking trojan, a malware family designed to steal banking credentials and perform fraudulent transactions. The campaign employs multiple vectors and malicious domains such as facturastbs.shop and grupobedfs.com to host payloads and phishing pages. The malware is delivered through social engineering tactics that trick users into clicking malicious links or opening infected attachments. The campaign's multi-pronged nature increases its reach and effectiveness, targeting a wide range of organizations with Spanish-speaking personnel. Although there are no known CVEs or public exploits associated with this campaign, the presence of numerous malware hashes and URLs provides actionable indicators of compromise. The campaign reflects a continuation of Augmented Marauder's focus on financial crime, leveraging phishing and trojan malware to compromise victims. The threat intelligence is shared under TLP: White, allowing broad dissemination for defensive purposes.
Potential Impact
This campaign poses a significant risk to organizations with Spanish-speaking employees, especially financial institutions and enterprises in Latin America and Europe. Successful infections can lead to credential theft, unauthorized access to banking accounts, and financial fraud, resulting in direct monetary losses. Beyond financial damage, compromised systems may be used for further lateral movement or data exfiltration, impacting confidentiality and integrity. The use of WhatsApp and other messaging platforms as delivery vectors increases the likelihood of user interaction and infection. Organizations lacking robust phishing defenses or user awareness training are particularly vulnerable. The campaign's expansion into Europe indicates a growing geographic scope, potentially affecting multinational companies and financial services providers. While the campaign is rated medium severity, the financial and reputational damage from successful intrusions can be substantial. The lack of known exploits in the wild suggests the threat is still emerging, offering a window for proactive defense.
Mitigation Recommendations
1. Implement targeted phishing awareness training focused on recognizing social engineering tactics used in this campaign, including suspicious WhatsApp messages and email links. 2. Deploy advanced email and messaging security solutions capable of detecting and blocking phishing URLs and malicious attachments, including sandboxing suspicious files. 3. Block known malicious domains and URLs associated with the campaign (e.g., facturastbs.shop, grupobedfs.com) at network perimeter and DNS levels. 4. Monitor network traffic for connections to identified malicious IPs and domains and investigate any anomalies. 5. Enforce multi-factor authentication (MFA) on all financial and critical systems to reduce impact if credentials are compromised. 6. Regularly update endpoint protection platforms with the latest threat intelligence and malware signatures. 7. Conduct incident response exercises simulating phishing attacks to improve detection and containment capabilities. 8. Encourage users to verify unexpected financial or invoice-related communications through independent channels before taking action. 9. Collaborate with regional cybersecurity organizations to share intelligence and stay updated on evolving tactics used by Augmented Marauder. 10. Review and harden WhatsApp and other messaging platform usage policies to limit exposure to unsolicited messages from unknown contacts.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.bluevoyant.com/blog/augmented-marauders-multi-pronged-casbaneiro-campaigns"]
- Adversary
- Augmented Marauder
- Pulse Id
- 69cd1d262a834decd25abb14
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hashaec9ed01b85713acc6a7f1da4d94ee1b | — | |
hasha5eacd9028639a7b148b66de168037c3cea78ecf | — | |
hash1693448804bf1c90ad7317af250bcd6ea021256e33e983b224aea81d4ecc2e20 | — | |
hash1af69a3283e28a8cc9a11819ecc2f2cff46dcabbfa78cefc71a02b881a064593 | — | |
hash239cb9232fe01c8b82eb627f66acc6848cb223dfea46d4923844c1fe20f1de49 | — | |
hash3e4002c7f0909d3c743b3586098e248d413f485c6bb033cafdb322bd8b206ebb | — | |
hash4e08a1525a62a387595a2e4942b56ec3f3b3259996115ea2e6ea3638ccb87705 | — | |
hash69fc15919044fc6a94bb251afd90a0a07204b79df3bc62c49ba6b0febefbc33e | — | |
hashb56d00addd6c6a266de3c739dad22aa1de52624066544929754d47332257cba6 | — | |
hashd1d08f7e44641d921fad22ed175b928c696befd14a55271eb203f8fcaff553d5 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://cgf.facturastbs.shop/a/08/150822/au | — | |
urlhttps://tt.grupobedfs.com/.../gera_pdf.php | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainfacturastbs.shop | — | |
domaingrupobedfs.com | — | |
domaincgf.facturastbs.shop | — | |
domaintt.grupobedfs.com | — |
Threat ID: 69cd3864e6bfc5ba1ddc2cfa
Added to database: 4/1/2026, 3:23:16 PM
Last enriched: 4/1/2026, 3:40:55 PM
Last updated: 4/6/2026, 8:02:52 AM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.