Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Unpacking Augmented Marauder’s Multi-Pronged Casbaneiro Campaigns

0
Medium
Published: Wed Apr 01 2026 (04/01/2026, 13:27:02 UTC)
Source: AlienVault OTX General

Description

BlueVoyant researchers have uncovered a broad, multi-pronged phishing campaign targeting Spanish-speaking users in organizations across Latin America and now Europe as well. While recent industry intelligence heavily documented attacks utilizing WhatsApp to deliver banking trojans under the umbrella of the Brazil-based eCrime group Augmented Marauder (a.k.a. Water Saci)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 15:40:55 UTC

Technical Analysis

Researchers at BlueVoyant have uncovered a broad, multi-pronged phishing campaign orchestrated by the Brazil-based eCrime group Augmented Marauder (also known as Water Saci). This campaign targets Spanish-speaking users in organizations across Latin America and has recently expanded into Europe. The attackers use phishing messages, including those delivered via WhatsApp, to distribute the Casbaneiro banking trojan, a malware family designed to steal banking credentials and perform fraudulent transactions. The campaign employs multiple vectors and malicious domains such as facturastbs.shop and grupobedfs.com to host payloads and phishing pages. The malware is delivered through social engineering tactics that trick users into clicking malicious links or opening infected attachments. The campaign's multi-pronged nature increases its reach and effectiveness, targeting a wide range of organizations with Spanish-speaking personnel. Although there are no known CVEs or public exploits associated with this campaign, the presence of numerous malware hashes and URLs provides actionable indicators of compromise. The campaign reflects a continuation of Augmented Marauder's focus on financial crime, leveraging phishing and trojan malware to compromise victims. The threat intelligence is shared under TLP: White, allowing broad dissemination for defensive purposes.

Potential Impact

This campaign poses a significant risk to organizations with Spanish-speaking employees, especially financial institutions and enterprises in Latin America and Europe. Successful infections can lead to credential theft, unauthorized access to banking accounts, and financial fraud, resulting in direct monetary losses. Beyond financial damage, compromised systems may be used for further lateral movement or data exfiltration, impacting confidentiality and integrity. The use of WhatsApp and other messaging platforms as delivery vectors increases the likelihood of user interaction and infection. Organizations lacking robust phishing defenses or user awareness training are particularly vulnerable. The campaign's expansion into Europe indicates a growing geographic scope, potentially affecting multinational companies and financial services providers. While the campaign is rated medium severity, the financial and reputational damage from successful intrusions can be substantial. The lack of known exploits in the wild suggests the threat is still emerging, offering a window for proactive defense.

Mitigation Recommendations

1. Implement targeted phishing awareness training focused on recognizing social engineering tactics used in this campaign, including suspicious WhatsApp messages and email links. 2. Deploy advanced email and messaging security solutions capable of detecting and blocking phishing URLs and malicious attachments, including sandboxing suspicious files. 3. Block known malicious domains and URLs associated with the campaign (e.g., facturastbs.shop, grupobedfs.com) at network perimeter and DNS levels. 4. Monitor network traffic for connections to identified malicious IPs and domains and investigate any anomalies. 5. Enforce multi-factor authentication (MFA) on all financial and critical systems to reduce impact if credentials are compromised. 6. Regularly update endpoint protection platforms with the latest threat intelligence and malware signatures. 7. Conduct incident response exercises simulating phishing attacks to improve detection and containment capabilities. 8. Encourage users to verify unexpected financial or invoice-related communications through independent channels before taking action. 9. Collaborate with regional cybersecurity organizations to share intelligence and stay updated on evolving tactics used by Augmented Marauder. 10. Review and harden WhatsApp and other messaging platform usage policies to limit exposure to unsolicited messages from unknown contacts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.bluevoyant.com/blog/augmented-marauders-multi-pronged-casbaneiro-campaigns"]
Adversary
Augmented Marauder
Pulse Id
69cd1d262a834decd25abb14
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashaec9ed01b85713acc6a7f1da4d94ee1b
hasha5eacd9028639a7b148b66de168037c3cea78ecf
hash1693448804bf1c90ad7317af250bcd6ea021256e33e983b224aea81d4ecc2e20
hash1af69a3283e28a8cc9a11819ecc2f2cff46dcabbfa78cefc71a02b881a064593
hash239cb9232fe01c8b82eb627f66acc6848cb223dfea46d4923844c1fe20f1de49
hash3e4002c7f0909d3c743b3586098e248d413f485c6bb033cafdb322bd8b206ebb
hash4e08a1525a62a387595a2e4942b56ec3f3b3259996115ea2e6ea3638ccb87705
hash69fc15919044fc6a94bb251afd90a0a07204b79df3bc62c49ba6b0febefbc33e
hashb56d00addd6c6a266de3c739dad22aa1de52624066544929754d47332257cba6
hashd1d08f7e44641d921fad22ed175b928c696befd14a55271eb203f8fcaff553d5

Url

ValueDescriptionCopy
urlhttps://cgf.facturastbs.shop/a/08/150822/au
urlhttps://tt.grupobedfs.com/.../gera_pdf.php

Domain

ValueDescriptionCopy
domainfacturastbs.shop
domaingrupobedfs.com
domaincgf.facturastbs.shop
domaintt.grupobedfs.com

Threat ID: 69cd3864e6bfc5ba1ddc2cfa

Added to database: 4/1/2026, 3:23:16 PM

Last enriched: 4/1/2026, 3:40:55 PM

Last updated: 4/6/2026, 9:31:15 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses