More than a decade in the past, researchers at antivirus firm Kaspersky recognized suspicious web visitors of what they thought was a recognized government-backed group, based mostly on comparable concentrating on and its phishing strategies. Soon, the researchers realized that they had discovered a way more superior hacking operation that was concentrating on the Cuban authorities, amongst others.
Eventually the researchers have been in a position to attribute the community exercise to a mysterious — and on the time fully unknown — Spanish-speaking hacking group that they known as Careto, after the Spanish slang phrase (“ugly face” or “masks” in English), which they discovered buried inside the malware’s code.
Careto was by no means publicly linked to a selected authorities. But TechCrunch has now realized that the researchers who first found the group have been satisfied that Spanish authorities hackers have been behind Careto’s espionage operations.
When Kaspersky first revealed the existence of Careto in 2014, its researchers known as the group “probably the most superior threats in the meanwhile,” with its stealthy malware able to stealing extremely delicate knowledge, together with non-public conversations and keystrokes from the computer systems it compromised, a lot akin to highly effective authorities adware immediately. Careto’s malware was used to hack into authorities establishments and personal firms all over the world.
Kaspersky averted publicly blaming who it thought was behind Careto. But internally, based on a number of individuals who labored at Kaspersky on the time and had data of the investigation, its researchers concluded that Careto was a hacking crew working for the Spanish authorities.
“There was little doubt of that, no less than no affordable [doubt],” one of many former workers informed TechCrunch, who like different sources on this story agreed to talk on situation of anonymity to debate delicate issues.
Careto is considered one of solely a handful of Western authorities hacking teams that has ever been mentioned in public, together with U.S. authorities items resembling Equation Group, broadly believed to be the U.S. National Security Agency; the Lamberts, believed to be the CIA; and the French authorities group referred to as Animal Farm, which was behind the Babar and Dino malware. In a uncommon admission, Bernard Barbier, former head of the French intelligence service DGSE publicly confirmed the French authorities was certainly behind Babar.
The Spanish authorities now joins this small group of Western authorities hacking teams.
Early in its investigation, Kaspersky found that the Careto hackers had focused a selected authorities community and programs in Cuba, based on a second former Kaspersky worker.
It was this Cuban authorities sufferer that sparked Kaspersky’s investigation into Careto, based on the individuals talking with TechCrunch.
“It all began with a man who labored for the Cuban authorities who obtained contaminated,” the third former Kaspersky worker, with data of the Careto investigation, informed TechCrunch. The particular person, who referred to the Cuban authorities sufferer as “affected person zero,” mentioned that it appeared the Careto hackers have been serious about Cuba as a result of throughout that point there have been members of the Basque terrorist group ETA within the nation.
Kaspersky researchers famous in a technical report printed after their discovery that Cuba had by far essentially the most variety of victims per nation on the time of the investigation into Careto’s actions, particularly one unnamed Cuban authorities establishment, which the report mentioned confirmed “the present curiosity of the attackers.”
This Cuban authorities sufferer would show key to hyperlink Careto to Spain, based on the previous Kaspersky workers.
“Internally we knew who did it,” the third former Kaspersky worker mentioned, including that that they had “excessive confidence” it was the Spanish authorities. Two different former Kaspersky workers, who additionally had data of the investigation, mentioned the researchers likewise concluded Spain was behind the assaults.
The firm, nevertheless, determined to not disclose it. “It wasn’t broadcast as a result of I believe they didn’t need to out a authorities like that,” a fourth former Kaspersky researcher mentioned. “We had a strict ‘no attribution’ coverage at Kaspersky. Sometimes that coverage was stretched however by no means damaged.”
Apart from Cuba, different Careto targets additionally pointed to Spain. The espionage operation affected a whole bunch of victims in Brazil, Morocco, Spain itself and — maybe tellingly — Gibraltar, the disputed British enclave on the Iberian peninsula that Spain has lengthy claimed as its personal territory.
Kaspersky declined to reply questions on its researchers’ conclusions.
“We don’t have interaction in any formal attribution,” Kaspersky spokesperson Mai Al Akkad informed TechCrunch in an e mail.
The Spanish Ministry of Defense declined to remark. The Cuban authorities didn’t reply to emails despatched to its Ministry of Foreign Affairs.
The discovery of Careto
After Kaspersky found the group’s malware in 2014 and, consequently, realized find out how to establish different computer systems compromised by it, the researchers discovered proof of Careto infections everywhere in the world, compromising victims in 31 nations spanning a number of continents.
In Africa, the group’s malware was present in Algeria, Morocco, and Libya; in Europe, it focused victims in France, Spain, and the United Kingdom. In Latin America, there have been victims in Brazil, Colombia, Cuba, and Venezuela.
In its technical report, Kaspersky mentioned that Cuba had essentially the most victims that have been being focused, with “all belonging to the identical establishment,” which the researchers perceived as of significance to the hackers at that time limit.
Spain had its personal explicit curiosity in Cuba within the previous years. As an exiled Cuban authorities official informed the Spanish day by day El Pais on the finish of 2013, there have been round 15 members of the fear group ETA who lived in Cuba with the approval of the native authorities. In 2014, a leaked U.S. diplomatic cable famous that Cuba had given refuge to ETA terrorists for years. Earlier in 2010, a Spanish decide ordered the arrest of ETA members residing in Cuba.
When protecting the information of the invention of Careto, the Spanish on-line information outlet El Diario famous that concentrating on nations resembling Brazil and Gibraltar would favor the Spanish authorities’s “geostrategic pursuits.” The Spanish authorities had been pushing for a consortium of government-owned and personal firms to win a bid to construct a high-speed railway in Brazil from Rio de Janeiro to São Paulo.
Aside from concentrating on authorities establishments, embassies, and diplomatic organizations, Kaspersky mentioned the Careto group additionally focused power firms, analysis establishments, and activists.
Kaspersky researchers wrote that they have been capable of finding proof that the Careto malware existed way back to 2007, and located subsequent variations of Careto able to exploiting Windows PCs, Macs, and Linux computer systems. The researchers mentioned they discovered potential proof of code able to concentrating on Android gadgets and iPhones.
While Kaspersky didn’t make its inner attribution public, its researchers left clear hints that pointed to Spain.
First, the corporate researchers famous that they discovered a string within the malware code that was notably fascinating: “Caguen1aMar.” That string is a contraction for the favored Spanish expletive, “me cago en la mar,” which accurately means “I sh–t within the sea,” however roughly interprets to “f—ok,” a phrase usually utilized in Spain, and never in different Spanish-speaking nations.
When Kaspersky introduced its discovery of Careto in 2014, the corporate printed a map exhibiting all of the nations that the hacking group had focused. Along with the map, Kaspersky included an illustration of a masks with bull’s horns and a nostril ring (the bull is a nationwide image of Spain), castanets or clackers (an instrument utilized in Spanish folks music), and the crimson and yellow colours of the Spanish flag.
A element within the map revealed how vital Cuba was for Careto. For sure nations, Kaspersky added icons specifying what sort of targets it was in a position to establish. The map confirmed Cuba had a single hacked sufferer, marked as a authorities establishment. Only Gibraltar, Morocco — whose proximity and territorial disputes make it a strategic espionage goal for Spain — and Switzerland have been the opposite territories with a authorities sufferer.

Kaspersky mentioned in 2014 that the Careto group’s malware was one of many “most superior threats” of the time for its capability to seize extremely delicate knowledge from a sufferer’s pc. Kaspersky mentioned the malware might additionally intercept web visitors, Skype conversations, encryption (PGP) keys, and VPN configurations, take screenshots, and “fetch all data from Nokia gadgets.”
The Careto group relied largely on spearphishing emails that contained malicious hyperlinks impersonating Spanish newspapers like El País, El Mundo, and Público, and movies about political topics and meals recipes. One of the previous Kaspersky workers informed TechCrunch that the phishing hyperlinks additionally included references to ETA and Basque information, which Kaspersky’s report omitted.
When clicking on these malicious hyperlinks, the sufferer would get contaminated utilizing an exploit that hacked the person’s particular system, then redirected to a authentic net web page in order to not elevate suspicions, based on Kaspersky’s report.
The Careto operators additionally took benefit of a since-patched vulnerability in older variations of Kaspersky’s antivirus software program, which the corporate mentioned in its 2014 printed report was the way it first found the malware.
The ubiquity of Kaspersky’s software program in Cuba successfully made it potential for Careto to focus on virtually anybody on the island with an web connection. (By 2018, the Russian antivirus firm managed some 90% of the island’s web safety market, based on Cuba Standard, an impartial information web site.) The antivirus is so fashionable throughout the nation that the corporate’s title has develop into a part of the native slang.
But quickly after Kaspersky printed its analysis, the Careto hackers shut down all of its operations found by the Russian agency, going so far as wiping its logs, which researchers famous was “not quite common” and put Careto into the “elite” part of presidency hacking teams.
“You can’t try this for those who’re not ready,” one of many former Kaspersky workers informed TechCrunch. “They systematically, and in a fast method, destroyed the entire thing, the entire infrastructure. Boom. It was simply gone.”
Careto will get caught once more
After Careto went darkish, neither Kaspersky nor every other cybersecurity firm publicly reported detecting Careto once more — till final yr.
Kaspersky introduced in May 2024 that it had discovered Careto’s malware as soon as once more, saying it noticed the group goal an unnamed group in Latin America that was “beforehand compromised” by the hacking group most not too long ago in 2022, once more in 2019, and on one other event greater than 10 years in the past.
Careto additionally hacked a second unnamed group, positioned in Central Africa, mentioned Kaspersky.
In a weblog put up later in December 2024, Kaspersky’s researchers attributed the brand new hacks to Careto “with medium to excessive confidence,” based mostly partially on filenames that have been “alarmingly comparable” to filenames present in Careto’s actions from a decade in the past, in addition to overlapping ways, strategies, and procedures, or TTPs, a cybersecurity expression that refers back to the distinctive behaviors of a sure hacking group.
Kaspersky researchers Georgy Kucherin and Marc Rivero López, who wrote a paper and offered their analysis on the Virus Bulletin safety convention in October 2024, mentioned Careto “has at all times performed cyber assaults with excessive warning,” however nonetheless “managed to make small however deadly errors throughout their latest operations” that matched exercise from Careto a decade earlier.
Despite that, Kucherin informed TechCrunch that they don’t know who, or which authorities, is behind the Careto hacking group.
“It’s probably a nation state,” mentioned Kucherin. “But what entity it was, who developed the malware? From a technical perspective, it’s unimaginable to inform.”
Contact Us
Do you have got extra details about Careto (aka The Mask), or different authorities hacking teams and operations? From a non-work system and community, you possibly can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or by way of Telegram and Keybase @lorenzofb, or e mail.
According to Kaspersky’s most up-to-date report, this time the Careto hackers broke into the unnamed Latin American sufferer’s e mail server after which planted its malware.
In one of many hacked machines the researchers analyzed, Kaspersky discovered that Careto’s malware might surreptitiously change on the pc’s microphone (whereas hiding the Windows icon that usually alerts the person that the mic is on), steal recordsdata, resembling private paperwork, session cookies that may enable entry to accounts without having a password, net looking histories from a number of browsers, and extra.
In the case of one other sufferer, based on the report, Careto hackers used a set of implants that work as a backdoor, a keylogger, and a screenshot-taker.
Despite the truth that they obtained caught, and in comparison with what Kaspersky discovered greater than a decade in the past, Kucherin mentioned that the Careto hackers are “nonetheless that good.”
Compared to the bigger and extra well-known government-backed hacking teams, just like the North Korean Lazarus Group and China’s APT41, Kucherin mentioned Careto is a “very small [advanced persistent threat] that surpasses all these massive ones in complexity.”
“Their assaults are a masterpiece,” mentioned Kucherin.