After a decade of inactivity, the advanced persistent threat (APT) group known as “The Mask” or “Careto” has reemerged, targeting organizations in Latin America and Central Africa. This Spanish-speaking group, active from 2007 to 2013, had previously claimed around 380 victims across 31 countries, including high-profile targets like government institutions and energy companies. Researchers from Kaspersky, who have been tracking Careto, identified the group’s recent sophisticated campaign aimed at stealing confidential documents, browser data, and cookies from popular messaging apps such as WhatsApp and WeChat.
The attackers gained initial access through MDaemon email servers and maintained persistence using a driver from the HitmanPro Alert malware scanner. They exploited a previously unknown vulnerability in a security product used by both targeted organizations, deploying four multimodal implants named FakeHMP, Careto2, Goreto, and the MDaemon implant. These implants enabled a range of malicious activities including keylogging, microphone recording, and file theft.
Kaspersky’s findings highlight the advanced techniques and custom tools used by Careto, emphasizing the importance of vigilance against APTs that can resurface with new methods. The resurgence of Careto underscores the need for robust cybersecurity measures and continuous monitoring to protect against sophisticated threats. Kaspersky has detailed the group’s latest tactics, techniques, and procedures in a private report for its customers, underscoring the ongoing threat posed by these highly skilled cyber adversaries.