Greater than a decade in the past, researchers at antivirus firm Kaspersky recognized suspicious web visitors of what they thought was a recognized government-backed group, based mostly on related concentrating on and its phishing methods. Quickly, the researchers realized they’d discovered a way more superior hacking operation that was concentrating on the Cuban authorities, amongst others.
Ultimately the researchers had been in a position to attribute the community exercise to a mysterious — and on the time fully unknown — Spanish-speaking hacking group that they referred to as Careto, after the Spanish slang phrase (“ugly face” or “masks” in English), which they discovered buried inside the malware’s code.
Careto was by no means publicly linked to a selected authorities. However TechCrunch has now discovered that the researchers who first found the group had been satisfied that Spanish authorities hackers had been behind Careto’s espionage operations.
When Kaspersky first revealed the existence of Careto in 2014, its researchers referred to as the group “one of the vital superior threats for the time being,” with its stealthy malware able to stealing extremely delicate information, together with non-public conversations and keystrokes from the computer systems it compromised, a lot akin to highly effective authorities spy ware right this moment. Careto’s malware was used to hack into authorities establishments and personal corporations world wide.
Kaspersky averted publicly blaming who it thought was behind Careto. However internally, in response to a number of individuals who labored at Kaspersky on the time and had information of the investigation, its researchers concluded that Careto was a hacking crew working for the Spanish authorities.
“There was little question of that, a minimum of no affordable [doubt],” one of many former staff informed TechCrunch, who like different sources on this story agreed to talk on situation of anonymity to debate delicate issues.
Careto is certainly one of solely a handful of Western authorities hacking teams that has ever been mentioned in public, together with U.S. authorities items comparable to Equation Group, extensively believed to be the U.S. Nationwide Safety Company; the Lamberts, believed to be the CIA; and the French authorities group generally known as Animal Farm, which was behind the Babar and Dino malware. In a uncommon admission, Bernard Barbier, former head of the French intelligence service DGSE publicly confirmed the French authorities was certainly behind Babar.
The Spanish authorities now joins this small group of Western authorities hacking teams.

Early in its investigation, Kaspersky found that the Careto hackers had focused a selected authorities community and techniques in Cuba, in response to a second former Kaspersky worker.
It was this Cuban authorities sufferer that sparked Kaspersky’s investigation into Careto, in response to the individuals talking with TechCrunch.
“It began with a man who labored for the Cuban authorities who obtained contaminated,” the third former Kaspersky worker, with information of the Careto investigation, informed TechCrunch. The individual, who referred to the Cuban authorities sufferer as “affected person zero,” mentioned that it appeared the Careto hackers had been enthusiastic about Cuba as a result of throughout that point there have been members of the Basque terrorist group ETA within the nation.
Kaspersky researchers famous in a technical report published after their discovery that Cuba had by far probably the most variety of victims per nation on the time of the investigation into Careto’s actions, particularly one unnamed Cuban authorities establishment, which the report mentioned confirmed “the present curiosity of the attackers.”
This Cuban authorities sufferer would show key to hyperlink Careto to Spain, in response to the previous Kaspersky staff.
“Internally we knew who did it,” the third former Kaspersky worker mentioned, including that they’d “excessive confidence” it was the Spanish authorities. Two different former Kaspersky staff, who additionally had information of the investigation, mentioned the researchers likewise concluded Spain was behind the assaults.
The corporate, nonetheless, determined to not disclose it. “It wasn’t broadcast as a result of I feel they didn’t wish to out a authorities like that,” a fourth former Kaspersky researcher mentioned. “We had a strict ‘no attribution’ coverage at Kaspersky. Typically that coverage was stretched however by no means damaged.”
Other than Cuba, different Careto targets additionally pointed to Spain. The espionage operation affected tons of of victims in Brazil, Morocco, Spain itself and — maybe tellingly — Gibraltar, the disputed British enclave on the Iberian peninsula that Spain has long claimed as its own territory.
Kaspersky declined to reply questions on its researchers’ conclusions.
“We don’t interact in any formal attribution,” Kaspersky spokesperson Mai Al Akkad informed TechCrunch in an e-mail.
The Spanish Ministry of Protection declined to remark. The Cuban authorities didn’t reply to emails despatched to its Ministry of International Affairs.
The invention of Careto
After Kaspersky discovered the group’s malware in 2014 and, because of this, discovered the way to establish different computer systems compromised by it, the researchers discovered proof of Careto infections all around the world, compromising victims in 31 nations spanning a number of continents.
In Africa, the group’s malware was present in Algeria, Morocco, and Libya; in Europe, it focused victims in France, Spain, and the UK. In Latin America, there have been victims in Brazil, Colombia, Cuba, and Venezuela.
In its technical report, Kaspersky mentioned that Cuba had probably the most victims that had been being focused, with “all belonging to the identical establishment,” which the researchers perceived as of significance to the hackers at that time limit.
Spain had its personal explicit curiosity in Cuba within the previous years. As an exiled Cuban authorities official told the Spanish daily El Pais on the finish of 2013, there have been round 15 members of the fear group ETA who lived in Cuba with the approval of the native authorities. In 2014, a leaked U.S. diplomatic cable famous that Cuba had given refuge to ETA terrorists for years. Earlier in 2010, a Spanish decide ordered the arrest of ETA members residing in Cuba.
When protecting the information of the invention of Careto, the Spanish on-line information outlet El Diario famous that concentrating on nations comparable to Brazil and Gibraltar would favor the Spanish authorities’s “geostrategic pursuits.” The Spanish authorities had been pushing for a consortium of government-owned and personal corporations to win a bid to construct a high-speed railway in Brazil from Rio de Janeiro to São Paulo.
Other than concentrating on authorities establishments, embassies, and diplomatic organizations, Kaspersky mentioned the Careto group additionally focused vitality corporations, analysis establishments, and activists.
Kaspersky researchers wrote that they had been capable of finding proof that the Careto malware existed way back to 2007, and located subsequent variations of Careto able to exploiting Home windows PCs, Macs, and Linux computer systems. The researchers mentioned they discovered doable proof of code able to concentrating on Android units and iPhones.
Whereas Kaspersky didn’t make its inner attribution public, its researchers left clear hints that pointed to Spain.
First, the corporate researchers famous that they discovered a string within the malware code that was notably attention-grabbing: “Caguen1aMar.” That string is a contraction for the favored Spanish expletive, “me cago en la mar,” which literally means “I sh–t within the sea,” however roughly interprets to “f—okay,” a phrase sometimes utilized in Spain, and never in different Spanish-speaking nations.
When Kaspersky introduced its discovery of Careto in 2014, the corporate revealed a map displaying all of the nations that the hacking group had focused. Together with the map, Kaspersky included an illustration of a masks with bull’s horns and a nostril ring (the bull is a nationwide image of Spain), castanets or clackers (an instrument utilized in Spanish folks music), and the pink and yellow colours of the Spanish flag.
A element within the map revealed how vital Cuba was for Careto. For sure nations, Kaspersky added icons specifying what sort of targets it was in a position to establish. The map confirmed Cuba had a single hacked sufferer, marked as a authorities establishment. Solely Gibraltar, Morocco — whose proximity and territorial disputes make it a strategic espionage goal for Spain — and Switzerland had been the opposite territories with a authorities sufferer.

Kaspersky mentioned in 2014 that the Careto group’s malware was one of many “most superior threats” of the time for its means to seize extremely delicate information from a sufferer’s pc. Kaspersky mentioned the malware may additionally intercept web visitors, Skype conversations, encryption (PGP) keys, and VPN configurations, take screenshots, and “fetch all info from Nokia units.”
The Careto group relied largely on spearphishing emails that contained malicious hyperlinks impersonating Spanish newspapers like El País, El Mundo, and Público, and movies about political topics and meals recipes. One of many former Kaspersky staff informed TechCrunch that the phishing hyperlinks additionally included references to ETA and Basque information, which Kaspersky’s report omitted.
When clicking on these malicious hyperlinks, the sufferer would get contaminated utilizing an exploit that hacked the person’s particular system, then redirected to a official net web page in order to not elevate suspicions, in response to Kaspersky’s report.
The Careto operators additionally took benefit of a since-patched vulnerability in older variations of Kaspersky’s antivirus software program, which the corporate mentioned in its 2014 revealed report was the way it first found the malware.
The ubiquity of Kaspersky’s software program in Cuba successfully made it doable for Careto to focus on nearly anybody on the island with an web connection. (By 2018, the Russian antivirus firm managed some 90% of the island’s web safety market, according to Cuba Standard, an unbiased information web site.) The antivirus is so well-liked throughout the nation that the corporate’s title has become part of the local slang.
However quickly after Kaspersky revealed its analysis, the Careto hackers shut down all of its operations found by the Russian agency, going so far as wiping its logs, which researchers famous was “not quite common” and put Careto into the “elite” part of presidency hacking teams.
“You may’t do this in case you’re not ready,” one of many former Kaspersky staff informed TechCrunch. “They systematically, and in a fast method, destroyed the entire thing, the entire infrastructure. Increase. It was simply gone.”
Careto will get caught once more
After Careto went darkish, neither Kaspersky nor every other cybersecurity firm publicly reported detecting Careto once more — till final 12 months.
Kaspersky announced in Could 2024 that it had discovered Careto’s malware as soon as once more, saying it noticed the group goal an unnamed group in Latin America that was “beforehand compromised” by the hacking group most just lately in 2022, once more in 2019, and on one other event greater than 10 years in the past.
Careto additionally hacked a second unnamed group, positioned in Central Africa, mentioned Kaspersky.
In a blog post later in December 2024, Kaspersky’s researchers attributed the brand new hacks to Careto “with medium to excessive confidence,” based mostly partly on filenames that had been “alarmingly related” to filenames present in Careto’s actions from a decade in the past, in addition to overlapping ways, methods, and procedures, or TTPs, a cybersecurity expression that refers back to the distinctive behaviors of a sure hacking group.
Kaspersky researchers Georgy Kucherin and Marc Rivero López, who wrote a paper and presented their research on the Virus Bulletin safety convention in October 2024, mentioned Careto “has at all times performed cyber assaults with excessive warning,” however nonetheless “managed to make small however deadly errors throughout their current operations” that matched exercise from Careto a decade earlier.
Regardless of that, Kucherin informed TechCrunch that they don’t know who, or which authorities, is behind the Careto hacking group.
“It’s possible a nation state,” mentioned Kucherin. “However what entity it was, who developed the malware? From a technical perspective, it’s unimaginable to inform.”
Contact Us
Do you’ve extra details about Careto (aka The Masks), or different authorities hacking teams and operations? From a non-work system and community, you’ll be able to contact Lorenzo Franceschi-Bicchierai securely on Sign at +1 917 257 1382, or by way of Telegram and Keybase @lorenzofb, or e-mail.
Based on Kaspersky’s most up-to-date report, this time the Careto hackers broke into the unnamed Latin American sufferer’s e-mail server after which planted its malware.
In one of many hacked machines the researchers analyzed, Kaspersky discovered that Careto’s malware may surreptitiously swap on the pc’s microphone (whereas hiding the Home windows icon that usually alerts the person that the mic is on), steal information, comparable to private paperwork, session cookies that may permit entry to accounts while not having a password, net searching histories from a number of browsers, and extra.
Within the case of one other sufferer, in response to the report, Careto hackers used a set of implants that work as a backdoor, a keylogger, and a screenshot-taker.
Even supposing they obtained caught, and in comparison with what Kaspersky discovered greater than a decade in the past, Kucherin mentioned that the Careto hackers are “nonetheless that good.”
In comparison with the bigger and extra well-known government-backed hacking teams, just like the North Korean Lazarus Group and China’s APT41, Kucherin mentioned Careto is a “very small [advanced persistent threat] that surpasses all these giant ones in complexity.”
“Their assaults are a masterpiece,” mentioned Kucherin.