Saturday, April 25, 2026

Mysterious hacking group Careto was run by the Spanish authorities, sources say

Greater than a decade in the past, researchers at antivirus firm Kaspersky recognized suspicious web visitors of what they thought was a recognized government-backed group, based mostly on comparable focusing on and its phishing strategies. Quickly, the researchers realized they’d discovered a way more superior hacking operation that was focusing on the Cuban authorities, amongst others.

Finally the researchers had been capable of attribute the community exercise to a mysterious — and on the time fully unknown — Spanish-speaking hacking group that they known as Careto, after the Spanish slang phrase (“ugly face” or “masks” in English), which they discovered buried throughout the malware’s code. 

Careto was by no means publicly linked to a selected authorities. However TechCrunch has now discovered that the researchers who first found the group had been satisfied that Spanish authorities hackers had been behind Careto’s espionage operations.

When Kaspersky first revealed the existence of Careto in 2014, its researchers known as the group “probably the most superior threats for the time being,” with its stealthy malware able to stealing extremely delicate information, together with non-public conversations and keystrokes from the computer systems it compromised, a lot akin to highly effective authorities adware right this moment. Careto’s malware was used to hack into authorities establishments and personal corporations all over the world.

Kaspersky prevented publicly blaming who it thought was behind Careto. However internally, in keeping with a number of individuals who labored at Kaspersky on the time and had data of the investigation, its researchers concluded that Careto was a hacking group working for the Spanish authorities. 

“There was little question of that, at the least no affordable [doubt],” one of many former staff informed TechCrunch, who like different sources on this story agreed to talk on situation of anonymity to debate delicate issues.

Careto is certainly one of solely a handful of Western authorities hacking teams that has ever been mentioned in public, together with U.S. authorities models resembling Equation Group, extensively believed to be the U.S. Nationwide Safety Company; the Lamberts, believed to be the CIA; and the French authorities group often known as Animal Farm, which was behind the Babar and Dino malware. In a uncommon admission, Bernard Barbier, former head of the French intelligence service DGSE publicly confirmed the French authorities was certainly behind Babar. 

The Spanish authorities now joins this small group of Western authorities hacking teams.

A screenshot of Careto’s malware code, which inspired the name of the hacking group.
A screenshot of Careto’s malware code, which impressed the identify of the hacking group. (Picture: Kaspersky)

Early in its investigation, Kaspersky found that the Careto hackers had focused a specific authorities community and programs in Cuba, in keeping with a second former Kaspersky worker. 

It was this Cuban authorities sufferer that sparked Kaspersky’s investigation into Careto, in keeping with the individuals talking with TechCrunch.

“It began with a man who labored for the Cuban authorities who bought contaminated,” the third former Kaspersky worker, with data of the Careto investigation, informed TechCrunch. The particular person, who referred to the Cuban authorities sufferer as “affected person zero,” mentioned that it appeared the Careto hackers had been enthusiastic about Cuba as a result of throughout that point there have been members of the Basque terrorist group ETA within the nation.

Kaspersky researchers famous in a technical report revealed after their discovery that Cuba had by far probably the most variety of victims per nation on the time of the investigation into Careto’s actions, particularly one unnamed Cuban authorities establishment, which the report mentioned confirmed “the present curiosity of the attackers.” 

This Cuban authorities sufferer would show key to hyperlink Careto to Spain, in keeping with the previous Kaspersky staff.

“Internally we knew who did it,” the third former Kaspersky worker mentioned, including that they’d “excessive confidence” it was the Spanish authorities. Two different former Kaspersky staff, who additionally had data of the investigation, mentioned the researchers likewise concluded Spain was behind the assaults. 

The corporate, nevertheless, determined to not disclose it. “It wasn’t broadcast as a result of I believe they didn’t wish to out a authorities like that,” a fourth former Kaspersky researcher mentioned. “We had a strict ‘no attribution’ coverage at Kaspersky. Generally that coverage was stretched however by no means damaged.”

Aside from Cuba, different Careto targets additionally pointed to Spain. The espionage operation affected a whole lot of victims in Brazil, Morocco, Spain itself and — maybe tellingly — Gibraltar, the disputed British enclave on the Iberian peninsula that Spain has lengthy claimed as its personal territory.

Kaspersky declined to reply questions on its researchers’ conclusions.

“We don’t interact in any formal attribution,” Kaspersky spokesperson Mai Al Akkad informed TechCrunch in an e-mail.

The Spanish Ministry of Protection declined to remark. The Cuban authorities didn’t reply to emails despatched to its Ministry of Overseas Affairs.

The invention of Careto

After Kaspersky found the group’s malware in 2014 and, in consequence, discovered the right way to determine different computer systems compromised by it, the researchers discovered proof of Careto infections all around the world, compromising victims in 31 international locations spanning a number of continents. 

In Africa, the group’s malware was present in Algeria, Morocco, and Libya; in Europe, it focused victims in France, Spain, and the UK. In Latin America, there have been victims in Brazil, Colombia, Cuba, and Venezuela. 

In its technical report, Kaspersky mentioned that Cuba had probably the most victims that had been being focused, with “all belonging to the identical establishment,” which the researchers perceived as of significance to the hackers at that cut-off date. 

Spain had its personal specific curiosity in Cuba within the previous years. As an exiled Cuban authorities official informed the Spanish each day El Pais on the finish of 2013, there have been round 15 members of the fear group ETA who lived in Cuba with the approval of the native authorities. In 2014, a leaked U.S. diplomatic cable famous that Cuba had given refuge to ETA terrorists for years. Earlier in 2010, a Spanish choose ordered the arrest of ETA members residing in Cuba.

When protecting the information of the invention of Careto, the Spanish on-line information outlet El Diario famous that focusing on international locations resembling Brazil and Gibraltar would favor the Spanish authorities’s “geostrategic pursuits.” The Spanish authorities had been pushing for a consortium of government-owned and personal corporations to win a bid to construct a high-speed railway in Brazil from Rio de Janeiro to São Paulo. 

Other than focusing on authorities establishments, embassies, and diplomatic organizations, Kaspersky mentioned the Careto group additionally focused vitality corporations, analysis establishments, and activists. 

Kaspersky researchers wrote that they had been capable of finding proof that the Careto malware existed way back to 2007, and located subsequent variations of Careto able to exploiting Home windows PCs, Macs, and Linux computer systems. The researchers mentioned they discovered doable proof of code able to focusing on Android units and iPhones.

Whereas Kaspersky didn’t make its inner attribution public, its researchers left clear hints that pointed to Spain. 

First, the corporate researchers famous that they discovered a string within the malware code that was significantly attention-grabbing: “Caguen1aMar.” That string is a contraction for the favored Spanish expletive, “me cago en la mar,” which actually means “I sh–t within the sea,” however roughly interprets to “f—okay,” a phrase sometimes utilized in Spain, and never in different Spanish-speaking international locations.  

When Kaspersky introduced its discovery of Careto in 2014, the corporate revealed a map displaying all of the international locations that the hacking group had focused. Together with the map, Kaspersky included an illustration of a masks with bull’s horns and a nostril ring (the bull is a nationwide image of Spain), castanets or clackers (an instrument utilized in Spanish folks music), and the purple and yellow colours of the Spanish flag. 

A element within the map revealed how vital Cuba was for Careto. For sure international locations, Kaspersky added icons specifying what kind of targets it was capable of determine. The map confirmed Cuba had a single hacked sufferer, marked as a authorities establishment. Solely Gibraltar, Morocco — whose proximity and territorial disputes make it a strategic espionage goal for Spain — and Switzerland had been the opposite territories with a authorities sufferer.

A map of careto's victims along with an illustration of a mask.
a map of careto’s victims together with An illustration of a masks (Picture: Kaspersky)

Kaspersky mentioned in 2014 that the Careto group’s malware was one of many “most superior threats” of the time for its potential to seize extremely delicate information from a sufferer’s pc. Kaspersky mentioned the malware may additionally intercept web visitors, Skype conversations, encryption (PGP) keys, and VPN configurations, take screenshots, and “fetch all info from Nokia units.”

The Careto group relied largely on spearphishing emails that contained malicious hyperlinks impersonating Spanish newspapers like El País, El Mundo, and Público, and movies about political topics and meals recipes. One of many former Kaspersky staff informed TechCrunch that the phishing hyperlinks additionally included references to ETA and Basque information, which Kaspersky’s report omitted. 

When clicking on these malicious hyperlinks, the sufferer would get contaminated utilizing an exploit that hacked the person’s particular machine, then redirected to a authentic internet web page in order to not increase suspicions, in keeping with Kaspersky’s report. 

The Careto operators additionally took benefit of a since-patched vulnerability in older variations of Kaspersky’s antivirus software program, which the corporate mentioned in its 2014 revealed report was the way it first found the malware. 

The ubiquity of Kaspersky’s software program in Cuba successfully made it doable for Careto to focus on virtually anybody on the island with an web connection. (By 2018, the Russian antivirus firm managed some 90% of the island’s web safety market, in keeping with Cuba Customary, an unbiased information web site.) The antivirus is so widespread throughout the nation that the corporate’s identify has turn out to be a part of the native slang. 

However quickly after Kaspersky revealed its analysis, the Careto hackers shut down all of its operations found by the Russian agency, going so far as wiping its logs, which researchers famous was “not quite common” and put Careto into the “elite” part of presidency hacking teams.

“You’ll be able to’t do this in case you’re not ready,” one of many former Kaspersky staff informed TechCrunch. “They systematically, and in a fast method, destroyed the entire thing, the entire infrastructure. Increase. It was simply gone.”

Careto will get caught once more

After Careto went darkish, neither Kaspersky nor every other cybersecurity firm publicly reported detecting Careto once more — till final 12 months. 

Kaspersky introduced in Could 2024 that it had discovered Careto’s malware as soon as once more, saying it noticed the group goal an unnamed group in Latin America that was “beforehand compromised” by the hacking group most just lately in 2022, once more in 2019, and on one other event greater than 10 years in the past.

Careto additionally hacked a second unnamed group, situated in Central Africa, mentioned Kaspersky.

In a weblog submit later in December 2024, Kaspersky’s researchers attributed the brand new hacks to Careto “with medium to excessive confidence,” based mostly partly on filenames that had been “alarmingly comparable” to filenames present in Careto’s actions from a decade in the past, in addition to overlapping ways, strategies, and procedures, or TTPs, a cybersecurity expression that refers back to the distinctive behaviors of a sure hacking group.

Kaspersky researchers Georgy Kucherin and Marc Rivero López, who wrote a paper and offered their analysis on the Virus Bulletin safety convention in October 2024, mentioned Careto “has at all times carried out cyber assaults with excessive warning,” however nonetheless “managed to make small however deadly errors throughout their latest operations” that matched exercise from Careto a decade earlier.

Regardless of that, Kucherin informed TechCrunch that they don’t know who, or which authorities, is behind the Careto hacking group. 

“It’s possible a nation state,” mentioned Kucherin. “However what entity it was, who developed the malware? From a technical perspective, it’s unattainable to inform.”

Contact Us

Do you might have extra details about Careto (aka The Masks), or different authorities hacking teams and operations? From a non-work machine and community, you may contact Lorenzo Franceschi-Bicchierai securely on Sign at +1 917 257 1382, or by way of Telegram and Keybase @lorenzofb, or e-mail.

In keeping with Kaspersky’s most up-to-date report, this time the Careto hackers broke into the unnamed Latin American sufferer’s e-mail server after which planted its malware. 

In one of many hacked machines the researchers analyzed, Kaspersky discovered that Careto’s malware may surreptitiously swap on the pc’s microphone (whereas hiding the Home windows icon that usually alerts the person that the mic is on), steal recordsdata, resembling private paperwork, session cookies that may permit entry to accounts while not having a password, internet shopping histories from a number of browsers, and extra.

Within the case of one other sufferer, in keeping with the report, Careto hackers used a set of implants that work as a backdoor, a keylogger, and a screenshot-taker. 

Even if they bought caught, and in comparison with what Kaspersky discovered greater than a decade in the past, Kucherin mentioned that the Careto hackers are “nonetheless that good.”

In comparison with the bigger and extra well-known government-backed hacking teams, just like the North Korean Lazarus Group and China’s APT41, Kucherin mentioned Careto is a “very small [advanced persistent threat] that surpasses all these massive ones in complexity.”

“Their assaults are a masterpiece,” mentioned Kucherin.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles