
The risk actor referred to as Darkish Caracal has been attributed to a marketing campaign that deployed a far off get admission to trojan referred to as Poco RAT in assaults concentrated on Spanish-speaking goals in Latin The united states in 2024.
The findings come from Russian cybersecurity corporate Sure Applied sciences, which described the malware as loaded with a “complete suite of espionage options.”
“It would add information, seize screenshots, execute instructions, and manipulate machine processes,” researchers Denis Kazakov and Sergey Samokhin mentioned in a technical file revealed closing week.
Poco RAT used to be prior to now documented by way of Cofense in July 2024, detailing the phishing assaults geared toward mining, production, hospitality, and utilities sectors. The an infection chains are characterised by way of finance-themed lures that cause a multi-step procedure to deploy the malware.

Whilst the marketing campaign used to be now not attributed to any risk at the moment, Sure Applied sciences mentioned it known tradecraft overlaps with Darkish Caracal, a complicated continual risk (APT) identified for running malware households like CrossRAT and Bandook. It is operational since a minimum of 2012.
In 2021, the cyber mercenary staff used to be tied to a cyber espionage marketing campaign dubbed Bandidos that delivered an up to date model of the Bandook malware in opposition to Spanish-speaking international locations in South The united states.
The newest set of assaults proceed their center of attention on Spanish-speaking customers, leveraging phishing emails with invoice-related subject matters that undergo malicious attachments written in Spanish as a place to begin. An research of Poco RAT artifacts signifies the intrusions are basically concentrated on enterprises in Venezuela, Chile, the Dominican Republic, Colombia, and Ecuador.
The hooked up decoy paperwork impersonate quite a lot of trade verticals, together with banking, production, healthcare, prescription drugs, and logistics, in an try to lend the scheme somewhat extra believability.
When opened, the information redirect sufferers to a hyperlink that triggers the obtain of a .rev archive from professional file-sharing products and services or cloud garage platforms like Google Power and Dropbox.
“Recordsdata with the .rev extension are generated the usage of WinRAR and have been in the beginning designed to reconstruct lacking or corrupted volumes in multi-part archives,” the researchers defined. “Risk actors repurpose them as stealthy payload bins, serving to malware evade safety detection.”
Provide throughout the archive is a Delphi-based dropper that is answerable for launching Poco RAT, which, in flip, establishes touch with a far off server and grants attackers complete management over compromised hosts. The malware will get its identify from using POCO libraries in its C++ codebase.

Probably the most supported instructions by way of Poco RAT are indexed underneath –
- T-01 – Ship amassed machine knowledge to the command-and-control (C2) server
- T-02 – Retrieve and transmit the lively window identify to the C2 server
- T-03 – Obtain and run an executable dossier
- T-04 – Obtain a dossier to the compromised device
- T-05 – Seize a screenshot and ship it to the C2 server
- T-06 – Execute a command in cmd.exe and ship the output to the C2 server
“Poco RAT does now not include a integrated patience mechanism,” the researchers mentioned. “As soon as preliminary reconnaissance is entire, the server most probably problems a command to determine patience, or attackers might use Poco RAT as a stepping stone to deploy the principle payload.”