UNC5518 Access-as-a-Service Campaign via ClickFix and Fake CAPTCHA Pages
Summary
Hide ▲
Show ▼
The ClickFix malware campaign has evolved to include multi-OS support and video tutorials that guide victims through the self-infection process. The campaign, which uses fake Cloudflare CAPTCHA pages and malicious PowerShell scripts, has been observed deploying various payloads, including information stealers and backdoors. The FileFix attack, a variant of the ClickFix family, impersonates Meta account suspension warnings to trick users into installing the StealC infostealer malware. The campaign has evolved over two weeks with different payloads, domains, and lures, indicating an attacker testing and adapting their infrastructure. The FileFix technique, created by red team researcher mr. d0x, uses the address bar in File Explorer to execute malicious commands. The campaign employs steganography to hide a second-stage PowerShell script and encrypted executables inside a JPG image, which is believed to be AI-generated. The StealC malware targets credentials from various applications, cryptocurrency wallets, and cloud services, and can take screenshots of the active desktop. The FileFix attack uses a multilingual phishing site to trick users into executing a malicious command via the File Explorer address bar. The attack leverages Bitbucket to host the malicious components, abusing a legitimate source code hosting platform to bypass detection. The attack involves a multi-stage PowerShell script that downloads an image, decodes it into the next-stage payload, and runs a Go-based loader to launch StealC. The attack uses advanced obfuscation techniques, including junk code and fragmentation, to hinder analysis efforts. The FileFix attack is more likely to be detected by security products due to the payload being executed by the web browser used by the victim. The FileFix attack demonstrates significant investment in tradecraft, with carefully engineered phishing infrastructure, payload delivery, and supporting elements to maximize evasion and impact. The MetaStealer attack, a variant of the ClickFix family, uses a fake Cloudflare Turnstile lure and an MSI package disguised as a PDF to deploy the MetaStealer infostealer malware. The attack involves a multi-stage infection chain that includes a DLL sideloading technique using a legitimate SentinelOne executable. The MetaStealer attack targets crypto wallets and other sensitive information, using a combination of social engineering and technical evasion techniques to deploy malware. Recently, threat actors have been abusing the decades-old Finger protocol to retrieve and execute remote commands on Windows devices. The Finger protocol is used to deliver commands that create a random-named path, download a zip archive disguised as a PDF, and extract a Python malware package. The Python program is executed using pythonw.exe __init__.py, and a callback is made to the attacker's server to confirm execution. A related batch file indicates that the Python package is an infostealer. Another campaign uses the Finger protocol to retrieve and run commands that look for malware research tools and exit if found. If no malware analysis tools are found, the commands download a zip archive disguised as PDF files and extract the NetSupport Manager RAT package. The commands configure a scheduled task to launch the remote access malware when the user logs in. The Finger protocol abuse appears to be carried out by a single threat actor conducting ClickFix attacks. A new EVALUSION ClickFix campaign has been discovered, delivering Amatera Stealer and NetSupport RAT. Amatera Stealer, an evolution of ACR Stealer, is available under a malware-as-a-service (MaaS) model and targets crypto-wallets, browsers, messaging applications, FTP clients, and email services. It employs advanced evasion techniques such as WoW64 SysCalls and is packed using PureCrypter. The stealer is injected into the MSBuild.exe process to harvest sensitive data and contact an external server to execute a PowerShell command to fetch and run NetSupport RAT. The campaign also involves phishing attacks using various malware families and phishing kits named Cephas and Tycoon 2FA. Tycoon 2FA is a phishing kit that bypasses multi-factor authentication (MFA) and authentication apps by intercepting usernames, passwords, session cookies, and MFA flows in real-time. It has been used in over 64,000 attacks this year, primarily targeting Microsoft 365 and Gmail. Tycoon 2FA includes anti-detection layers and can lead to total session takeover, allowing attackers to move laterally into various enterprise systems. Legacy MFA methods are vulnerable to Tycoon 2FA, and phishing-proof MFA solutions like Token Ring and Token BioStick are recommended to prevent such attacks. A new operation embedding StealC V2 inside Blender project files has been observed targeting victims for at least six months. The attackers placed manipulated .blend files on platforms such as CGTrader, where users downloaded them as routine 3D assets. When opened with Blender’s Auto Run feature enabled, the files executed concealed Python scripts that launched a multistage infection. The infection chain began with a tampered Rig_Ui.py script embedded inside the .blend file. This script fetched a loader from a remote workers.dev domain, which then downloaded a PowerShell stage and two ZIP archives containing Python-based stealers. Once extracted into the Windows temp directory, the malware created LNK files to secure persistence, then used Pyramid C2 channels to retrieve encrypted payloads. StealC V2, promoted on underground forums since April 2025, has rapidly expanded its feature set. It now targets more than 23 browsers, over 100 plugins, more than 15 desktop wallets, and a range of messaging, VPN and mail clients. Its pricing, from $200 per month to $800 for 6 months, has made it accessible to low-tier cybercriminals seeking ready-to-use tools. ClickFix attack variants have been observed using a realistic-looking Windows Update animation in a full-screen browser page to trick users into executing malicious commands. The new ClickFix variants drop the LummaC2 and Rhadamanthys information stealers. The attack uses steganography to encode the final malware payload inside an image. The process involves multiple stages that use PowerShell code and a .NET assembly (the Stego Loader) responsible for reconstructing the final payload embedded inside a PNG file in an encrypted state. The shellcode holding the infostealer samples is packed using the Donut tool. The Rhadamanthys variant that used the Windows Update lure was first spotted by researchers back in October, before Operation Endgame took down parts of its infrastructure on November 13. A new campaign codenamed JackFix leverages fake adult websites (xHamster, PornHub clones) as its phishing mechanism, likely distributed via malvertising. The JackFix campaign displays highly convincing fake Windows update screens in an attempt to get the victim to run malicious code. The attack heavily leans on obfuscation to conceal ClickFix-related code and blocks users from escaping the full-screen alert by disabling the Escape and F11 buttons, along with F5 and F12 keys. The initial command executed is an MSHTA payload that's launched using the legitimate mshta.exe binary, which contains JavaScript designed to run a PowerShell command to retrieve another PowerShell script from a remote server. The PowerShell script attempts to elevate privileges and creates Microsoft Defender Antivirus exclusions for command-and-control (C2) addresses and paths where the payloads are staged. The PowerShell script serves up to eight different payloads, including Rhadamanthys Stealer, Vidar Stealer 2.0, RedLine Stealer, Amadey, and other unspecified loaders and RATs. The threat actor often changes the URI used to host the first mshta.exe stage and has been observed moving from hosting the second stage on the domain securitysettings.live to xoiiasdpsdoasdpojas.com, although both point to the same IP address 141.98.80.175. An initial access broker tracked as Storm-0249 is abusing endpoint detection and response solutions and trusted Microsoft Windows utilities to load malware, establish communication, and persistence in preparation for ransomware attacks. The threat actor has moved beyond mass phishing and adopted stealthier, more advanced methods that prove effective and difficult for defenders to counter. In one attack analyzed by researchers at cybersecurity company ReliaQuest, Storm-0249 leveraged the SentinelOne EDR components to hide malicious activity. The attack started with ClickFix social engineering that tricked users into pasting and executing curl commands in the Windows Run dialog to download a malicious MSI package with SYSTEM privileges. A malicious PowerShell script is also fetched from a spoofed Microsoft domain, which is piped straight onto the system's memory, never touching the disk and thus evading antivirus detection. The MSI file drops a malicious DLL (SentinelAgentCore.dll), which is placed strategically alongside the pre-existing, legitimate SentinelAgentWorker.exe, which is already installed as part of the victim's SentinelOne EDR. Next, the attacker loads the DLL using the signed SentinelAgentWorker (DLL sideloading), executing the file within the trusted, privileged EDR process and obtaining stealthy persistence that survives operating system updates. Once the attacker gains access, they use the SentinelOne component to collect system identifiers through legitimate Windows utilities like reg.exe and findstr.exe, and to funnel encrypted HTTPS command-and-control (C2) traffic. The compromised systems are profiled using 'MachineGuid,' a unique hardware-based identifier that ransomware groups like LockBit and ALPHV use for binding encryption keys to specific victims. The abuse of trusted, signed EDR processes bypasses nearly all traditional monitoring. The researchers recommend that system administrators rely on behavior-based detection that identifies trusted processes loading unsigned DLLs from non-standard paths. Furthermore, it is helpful to set stricter controls for curl, PowerShell, and LoLBin execution. A new variation of the ClickFix attack dubbed 'ConsentFix' abuses the Azure CLI OAuth app to hijack Microsoft accounts without the need for a password or to bypass multi-factor authentication (MFA) verifications. ConsentFix tricks victims into completing the Azure CLI OAuth flow and steals the resulting authorization code, which is exchanged for full account access. The attack starts with victims landing on a compromised, legitimate website that ranks high on Google Search results. Victims are shown a fake Cloudflare Turnstile CAPTCHA widget that asks for a valid business email address, filtering out bots and non-targets. Victims are instructed to click a 'Sign in' button that opens a legitimate Microsoft URL in a new tab, leading to an Azure login page. The attack completes when victims paste the URL containing the Azure CLI OAuth authorization code into the malicious page, granting attackers access to the Microsoft account via Azure CLI. The attack triggers only once per victim IP address, preventing repeated phishing attempts on the same IP. Defenders are advised to monitor for unusual Azure CLI login activity, such as logins from new IP addresses, and to check for legacy Graph scopes used by attackers to evade detection. Over the past six months, hackers have increasingly relied on the browser-in-the-browser (BitB) method to trick users into providing Facebook account credentials. The BitB phishing technique was developed by security researcher mr.d0x in 2022. In a BitB attack, users who visit attacker-controlled webpages are presented with a fake browser pop-up containing a login form. The pop-up is implemented using an iframe that imitates the authentication interface of legitimate platforms and can be customized with a window title and URL that make the deception more difficult to detect. Recent phishing campaigns targeting Facebook users impersonate law firms claiming copyright infringement, threatening imminent account suspension, or Meta security notifications about unauthorized logins. To avoid detection and to increase the sense of legitimacy, cybercriminals added shortened URLs and fake Meta CAPTCHA pages. In the final stage of the attack, victims are prompted to log in by entering their Facebook credentials in a fake pop-up window. Trellix discovered a high number of phishing pages hosted on legitimate cloud platforms like Netlify and Vercel, which mimic Meta's Privacy Center portal, redirecting users to pages disguised as appeal forms that collected personal information. These campaigns constitute a significant evolution compared to standard Facebook phishing campaigns that security researchers typically observe. The key shift lies in the abuse of trusted infrastructure, utilizing legitimate cloud hosting services like Netlify and Vercel, and URL shorteners to bypass traditional security filters and lend a false sense of security to phishing pages. Most critically, the emergence of the Browser-in-the-Browser (BitB) technique represents a major escalation. By creating a custom-built, fake login pop-up window within the victim's browser, this method capitalizes on user familiarity with authentication flows, making credential theft nearly impossible to detect visually.
Timeline
-
17.11.2025 18:53 3 articles · 1mo ago
EVALUSION ClickFix campaign delivers Amatera Stealer and NetSupport RAT
A new EVALUSION ClickFix campaign has been discovered, delivering Amatera Stealer and NetSupport RAT. Amatera Stealer, an evolution of ACR Stealer, is available under a malware-as-a-service (MaaS) model and targets crypto-wallets, browsers, messaging applications, FTP clients, and email services. It employs advanced evasion techniques such as WoW64 SysCalls and is packed using PureCrypter. The stealer is injected into the MSBuild.exe process to harvest sensitive data and contact an external server to execute a PowerShell command to fetch and run NetSupport RAT. The campaign also involves phishing attacks using various malware families and phishing kits named Cephas and Tycoon 2FA. Tycoon 2FA is a phishing kit that bypasses multi-factor authentication (MFA) and authentication apps by intercepting usernames, passwords, session cookies, and MFA flows in real-time. It has been used in over 64,000 attacks this year, primarily targeting Microsoft 365 and Gmail. The kit includes anti-detection layers and can lead to total session takeover, allowing attackers to move laterally into various enterprise systems. Legacy MFA methods like SMS codes, push notifications, and TOTP apps are vulnerable to Tycoon 2FA due to their reliance on user behavior. Criminal groups such as Scattered Spider, Octo Tempest, and Storm 1167 are using Tycoon 2FA daily. Phishing-proof MFA solutions, such as Token Ring and Token BioStick, use biometric authentication, proximity-based checks, and domain binding to prevent phishing attacks. Token Ring and Token BioStick solutions are inexpensive, available today, and provide a better user experience with faster authentication times.
Show sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
-
17.09.2025 17:01 2 articles · 3mo ago
MetaStealer attack uses fake Cloudflare Turnstile and MSI package
The MetaStealer attack, a variant of the ClickFix family, uses a fake Cloudflare Turnstile lure and an MSI package disguised as a PDF to deploy the MetaStealer infostealer malware. The attack involves a multi-stage infection chain that includes a DLL sideloading technique using a legitimate SentinelOne executable. The MetaStealer attack targets crypto wallets and other sensitive information, using a combination of social engineering and technical evasion techniques to deploy malware.
Show sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
-
16.09.2025 15:00 8 articles · 4mo ago
FileFix attack impersonates Meta and deploys StealC infostealer
A Russian-linked campaign delivers the StealC V2 information stealer malware through malicious Blender files uploaded to 3D model marketplaces like CGTrader. The campaign exploits Blender's Auto Run feature to execute embedded Python scripts that fetch a malware loader from a Cloudflare Workers domain. The loader then retrieves a PowerShell script that downloads two ZIP archives, which unpack into the %TEMP% folder and drop LNK files in the Startup directory for persistence. The campaign deploys two payloads: the StealC infostealer and an auxiliary Python stealer. The StealC malware used in this campaign is the latest variant of the second major version, with expanded data-stealing capabilities and support for exfiltration from various browsers, cryptocurrency wallets, messaging apps, VPN clients, and mail clients. Despite being documented since 2023, the malware remains elusive to anti-virus products, with no security engine on VirusTotal detecting the analyzed variant. The campaign has been active for at least six months, involving the implantation of malicious .blend files on platforms like CGTrader. The attack chains involve uploading malicious .blend files containing a malicious "Rig_Ui.py" script, which is executed as soon as the files are opened with Blender's Auto Run feature enabled. The Rig_Ui.py script fetches a PowerShell script to download two ZIP archives, one of which contains a payload for StealC V2, while the second archive deploys a secondary Python-based stealer on the compromised host. The updated version of StealC supports a wide range of information gathering features, allowing data to be extracted from various browsers, web plugins, cryptocurrency wallet apps, messaging services, VPNs, and email clients. The campaign shares similarities with a prior campaign linked to Russian-speaking threat actors, involving impersonating the Electronic Frontier Foundation (EFF) to target the online gaming community and infect them with StealC and Pyramid C2. Blender's documentation acknowledges the security risk posed by the ability to include Python scripts within blend-files, which can execute arbitrary Python scripts.
Show sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
-
21.08.2025 19:25 11 articles · 4mo ago
UNC5518 Access-as-a-Service Campaign via ClickFix and Fake CAPTCHA Pages
The ClickFix attacks now feature videos that guide victims through the self-infection process, a timer to pressure targets into taking risky actions, and automatic detection of the operating system to provide the correct commands. The attacks are primarily promoted through malvertizing on Google Search and exploit known flaws on outdated WordPress plugins to compromise legitimate sites. The payloads delivered in these attacks include MSHTA executable, PowerShell scripts, and living-off-the-land binaries. Additionally, threat actors have been abusing the decades-old Finger protocol to retrieve and execute remote commands on Windows devices. The Finger protocol is used to deliver commands that create a random-named path, download a zip archive disguised as a PDF, and extract a Python malware package. The Python program is executed using pythonw.exe __init__.py, and a callback is made to the attacker's server to confirm execution. A related batch file indicates that the Python package is an infostealer. Another campaign uses the Finger protocol to retrieve and run commands that look for malware research tools and exit if found. If no malware analysis tools are found, the commands download a zip archive disguised as PDF files and extract the NetSupport Manager RAT package. The commands configure a scheduled task to launch the remote access malware when the user logs in. The Finger protocol abuse appears to be carried out by a single threat actor conducting ClickFix attacks. A new EVALUSION ClickFix campaign has been discovered, delivering Amatera Stealer and NetSupport RAT. Amatera Stealer, an evolution of ACR Stealer, is available under a malware-as-a-service (MaaS) model and targets crypto-wallets, browsers, messaging applications, FTP clients, and email services. It employs advanced evasion techniques such as WoW64 SysCalls and is packed using PureCrypter. The stealer is injected into the MSBuild.exe process to harvest sensitive data and contact an external server to execute a PowerShell command to fetch and run NetSupport RAT. ClickFix attack variants have been observed using a realistic-looking Windows Update animation in a full-screen browser page to trick users into executing malicious commands. The new ClickFix variants drop the LummaC2 and Rhadamanthys information stealers. The attack uses steganography to encode the final malware payload inside an image. The process involves multiple stages that use PowerShell code and a .NET assembly (the Stego Loader) responsible for reconstructing the final payload embedded inside a PNG file in an encrypted state. The shellcode holding the infostealer samples is packed using the Donut tool. The Rhadamanthys variant that used the Windows Update lure was first spotted by researchers back in October, before Operation Endgame took down parts of its infrastructure on November 13. A new campaign codenamed JackFix leverages fake adult websites (xHamster, PornHub clones) as its phishing mechanism, likely distributed via malvertising. The JackFix campaign displays highly convincing fake Windows update screens in an attempt to get the victim to run malicious code. The attack heavily leans on obfuscation to conceal ClickFix-related code and blocks users from escaping the full-screen alert by disabling the Escape and F11 buttons, along with F5 and F12 keys. The initial command executed is an MSHTA payload that's launched using the legitimate mshta.exe binary, which contains JavaScript designed to run a PowerShell command to retrieve another PowerShell script from a remote server. The PowerShell script attempts to elevate privileges and creates Microsoft Defender Antivirus exclusions for command-and-control (C2) addresses and paths where the payloads are staged. The PowerShell script serves up to eight different payloads, including Rhadamanthys Stealer, Vidar Stealer 2.0, RedLine Stealer, Amadey, and other unspecified loaders and RATs. The threat actor often changes the URI used to host the first mshta.exe stage and has been observed moving from hosting the second stage on the domain securitysettings.live to xoiiasdpsdoasdpojas.com, although both point to the same IP address 141.98.80.175. An initial access broker tracked as Storm-0249 is abusing endpoint detection and response solutions and trusted Microsoft Windows utilities to load malware, establish communication, and persistence in preparation for ransomware attacks. The threat actor has moved beyond mass phishing and adopted stealthier, more advanced methods that prove effective and difficult for defenders to counter. In one attack analyzed by researchers at cybersecurity company ReliaQuest, Storm-0249 leveraged the SentinelOne EDR components to hide malicious activity. The attack started with ClickFix social engineering that tricked users into pasting and executing curl commands in the Windows Run dialog to download a malicious MSI package with SYSTEM privileges. A malicious PowerShell script is also fetched from a spoofed Microsoft domain, which is piped straight onto the system's memory, never touching the disk and thus evading antivirus detection. The MSI file drops a malicious DLL (SentinelAgentCore.dll), which is placed strategically alongside the pre-existing, legitimate SentinelAgentWorker.exe, which is already installed as part of the victim's SentinelOne EDR. Next, the attacker loads the DLL using the signed SentinelAgentWorker (DLL sideloading), executing the file within the trusted, privileged EDR process and obtaining stealthy persistence that survives operating system updates. Once the attacker gains access, they use the SentinelOne component to collect system identifiers through legitimate Windows utilities like reg.exe and findstr.exe, and to funnel encrypted HTTPS command-and-control (C2) traffic. The compromised systems are profiled using 'MachineGuid,' a unique hardware-based identifier that ransomware groups like LockBit and ALPHV use for binding encryption keys to specific victims. The abuse of trusted, signed EDR processes bypasses nearly all traditional monitoring. The researchers recommend that system administrators rely on behavior-based detection that identifies trusted processes loading unsigned DLLs from non-standard paths. Furthermore, it is helpful to set stricter controls for curl, PowerShell, and LoLBin execution. A new variation of the ClickFix attack dubbed 'ConsentFix' abuses the Azure CLI OAuth app to hijack Microsoft accounts without the need for a password or to bypass multi-factor authentication (MFA) verifications. ConsentFix tricks victims into completing the Azure CLI OAuth flow and steals the resulting authorization code, which is exchanged for full account access. The attack starts with victims landing on a compromised, legitimate website that ranks high on Google Search results. Victims are shown a fake Cloudflare Turnstile CAPTCHA widget that asks for a valid business email address, filtering out bots and non-targets. Victims are instructed to click a 'Sign in' button that opens a legitimate Microsoft URL in a new tab, leading to an Azure login page. The attack completes when victims paste the URL containing the Azure CLI OAuth authorization code into the malicious page, granting attackers access to the Microsoft account via Azure CLI. The attack triggers only once per victim IP address, preventing repeated phishing attempts on the same IP. Defenders are advised to monitor for unusual Azure CLI login activity, such as logins from new IP addresses, and to check for legacy Graph scopes used by attackers to evade detection. Over the past six months, hackers have increasingly relied on the browser-in-the-browser (BitB) method to trick users into providing Facebook account credentials. The BitB phishing technique was developed by security researcher mr.d0x in 2022. In a BitB attack, users who visit attacker-controlled webpages are presented with a fake browser pop-up containing a login form. The pop-up is implemented using an iframe that imitates the authentication interface of legitimate platforms and can be customized with a window title and URL that make the deception more difficult to detect. Recent phishing campaigns targeting Facebook users impersonate law firms claiming copyright infringement, threatening imminent account suspension, or Meta security notifications about unauthorized logins. To avoid detection and to increase the sense of legitimacy, cybercriminals added shortened URLs and fake Meta CAPTCHA pages. In the final stage of the attack, victims are prompted to log in by entering their Facebook credentials in a fake pop-up window. Trellix discovered a high number of phishing pages hosted on legitimate cloud platforms like Netlify and Vercel, which mimic Meta's Privacy Center portal, redirecting users to pages disguised as appeal forms that collected personal information. These campaigns constitute a significant evolution compared to standard Facebook phishing campaigns that security researchers typically observe.
Show sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
Information Snippets
-
UNC5518 uses ClickFix to deploy the CORNFLAKE.V3 backdoor via fake CAPTCHA pages and malicious PowerShell scripts.
First reported: 21.08.2025 19:253 sources, 8 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The initial infection vector involves tricking users into executing a PowerShell script via the Windows Run dialog.
First reported: 21.08.2025 19:253 sources, 9 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
-
UNC5774 and UNC4108 leverage the access provided by UNC5518 to deploy additional payloads.
First reported: 21.08.2025 19:253 sources, 6 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
CORNFLAKE.V3 supports the execution of various payload types, including executables, DLLs, JavaScript files, batch scripts, and PowerShell commands.
First reported: 21.08.2025 19:253 sources, 6 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
CORNFLAKE.V3 collects system information and transmits it via Cloudflare tunnels to evade detection.
First reported: 21.08.2025 19:253 sources, 6 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
CORNFLAKE.V3 features host persistence via a registry Run key and supports additional payload types compared to its predecessor, CORNFLAKE.V2.
First reported: 21.08.2025 19:253 sources, 6 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
WINDYTWIST.SEA, a C version of WINDYTWIST, supports lateral movement within infected networks.
First reported: 21.08.2025 19:253 sources, 6 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix attack is a new variant of the ClickFix family of attacks.
First reported: 16.09.2025 15:003 sources, 6 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
FileFix uses the address bar in File Explorer to execute malicious commands.
First reported: 16.09.2025 15:003 sources, 6 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix technique was created by red team researcher mr.d0x.
First reported: 16.09.2025 15:003 sources, 7 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The new FileFix campaign impersonates Meta account suspension warnings.
First reported: 16.09.2025 15:003 sources, 7 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix campaign uses a multi-language phishing page to trick users.
First reported: 16.09.2025 15:003 sources, 7 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The campaign disguises a PowerShell command as a file path to install malware.
First reported: 16.09.2025 15:003 sources, 7 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix campaign uses steganography to hide a second-stage PowerShell script and encrypted executables inside a JPG image.
First reported: 16.09.2025 15:003 sources, 7 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The final payload in the FileFix campaign is the StealC infostealer malware.
First reported: 16.09.2025 15:004 sources, 8 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
StealC targets credentials from web browsers, messaging apps, cryptocurrency wallets, cloud credentials, VPN and gaming apps, and can take screenshots of the active desktop.
First reported: 16.09.2025 15:004 sources, 8 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix campaign has evolved over two weeks with different payloads, domains, and lures.
First reported: 16.09.2025 15:003 sources, 7 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix campaign demonstrates an attacker testing and adapting their infrastructure.
First reported: 16.09.2025 15:003 sources, 7 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix campaign has been observed in multiple countries, including the US, Philippines, Bangladesh, Tunisia, Dominican Republic, Germany, China, Peru, Nepal, and Serbia.
First reported: 16.09.2025 15:003 sources, 6 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The phishing site used in the FileFix campaign has been translated into at least 16 different languages, indicating a global targeting strategy.
First reported: 16.09.2025 15:003 sources, 6 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix technique was conceived by a red team researcher known as mr. d0x in mid-2022.
First reported: 16.09.2025 15:003 sources, 6 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix campaign uses AI-generated images to conceal malicious payloads.
First reported: 16.09.2025 15:003 sources, 6 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix campaign is considered the most mature and sophisticated to date, combining convincing phishing, tough code obfuscation, and robust steganography.
First reported: 16.09.2025 15:003 sources, 6 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix campaign has a broader range of high-value targets compared to ClickFix due to its use of File Explorer.
First reported: 16.09.2025 15:003 sources, 6 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix campaign is expected to see more attacks in the near future due to its effectiveness and novelty.
First reported: 16.09.2025 15:003 sources, 6 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix attack uses a multilingual phishing site to trick users into executing a malicious command via the File Explorer address bar.
First reported: 16.09.2025 15:332 sources, 5 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix attack leverages Bitbucket to host the malicious components, abusing a legitimate source code hosting platform to bypass detection.
First reported: 16.09.2025 15:332 sources, 5 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix attack involves a multi-stage PowerShell script that downloads an image, decodes it into the next-stage payload, and runs a Go-based loader to launch StealC.
First reported: 16.09.2025 15:332 sources, 5 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix attack uses advanced obfuscation techniques, including junk code and fragmentation, to hinder analysis efforts.
First reported: 16.09.2025 15:332 sources, 5 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix attack is more likely to be detected by security products due to the payload being executed by the web browser used by the victim.
First reported: 16.09.2025 15:332 sources, 5 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix attack demonstrates significant investment in tradecraft, with carefully engineered phishing infrastructure, payload delivery, and supporting elements to maximize evasion and impact.
First reported: 16.09.2025 15:332 sources, 5 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix attack is more sophisticated than ClickFix, as it abuses a widely used browser feature instead of the Run dialog or Terminal app.
First reported: 16.09.2025 15:332 sources, 5 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix attack has been observed in a campaign that uses a combination of fake support portals, Cloudflare CAPTCHA error pages, and clipboard hijacking to socially engineer victims into running malicious PowerShell code.
First reported: 16.09.2025 15:332 sources, 5 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix attack has been observed using an AutoHotkey (AHK) script to profile the compromised host and deliver additional payloads, including AnyDesk, TeamViewer, information stealers, and clipper malware.
First reported: 16.09.2025 15:332 sources, 4 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The FileFix attack has been observed using an MSHTA command pointing to a lookalike Google domain to retrieve and execute a remote malicious script.
First reported: 16.09.2025 15:332 sources, 4 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The MetaStealer malware is a commodity infostealer known for harvesting credentials and stealing files.
First reported: 17.09.2025 17:011 source, 4 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The MetaStealer attack involves a fake Cloudflare Turnstile lure, the Windows search protocol, and an MSI package disguised as a PDF.
First reported: 17.09.2025 17:011 source, 4 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The MetaStealer attack uses a Windows shortcut LNK file disguised as a PDF file to execute malicious commands.
First reported: 17.09.2025 17:011 source, 4 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The MetaStealer attack involves a DLL sideloading technique using a legitimate SentinelOne executable.
First reported: 17.09.2025 17:011 source, 4 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The MetaStealer attack uses a custom search query as part of the search-ms URI protocol to redirect victims to an attacker-controlled SMB share.
First reported: 17.09.2025 17:011 source, 4 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The MetaStealer attack involves an MSI package containing a DLL and a CAB archive with additional malicious files.
First reported: 17.09.2025 17:011 source, 4 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The MetaStealer attack uses a large binary protected with Private EXE Protector to evade detection.
First reported: 17.09.2025 17:011 source, 4 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The MetaStealer attack targets crypto wallets and other sensitive information.
First reported: 17.09.2025 17:011 source, 4 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The MetaStealer attack involves a multi-stage infection chain that includes a fake PDF lure to grab the victim's hostname.
First reported: 17.09.2025 17:011 source, 4 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The MetaStealer attack uses a combination of social engineering and technical evasion techniques to deploy malware.
First reported: 17.09.2025 17:011 source, 4 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
ClickFix attacks now feature videos that guide victims through the self-infection process.
First reported: 06.11.2025 16:002 sources, 8 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
A timer is used to pressure victims into taking risky actions.
First reported: 06.11.2025 16:002 sources, 7 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The attacks automatically detect the operating system to provide the correct commands.
First reported: 06.11.2025 16:002 sources, 7 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Push Security researchers have observed these changes in recent ClickFix campaigns.
First reported: 06.11.2025 16:002 sources, 5 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The fake Cloudflare CAPTCHA verification challenge includes a one-minute countdown timer.
First reported: 06.11.2025 16:002 sources, 7 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The attacks are primarily promoted through malvertizing on Google Search.
First reported: 06.11.2025 16:002 sources, 8 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Threat actors exploit known flaws on outdated WordPress plugins to compromise legitimate sites.
First reported: 06.11.2025 16:002 sources, 7 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Threat actors use SEO poisoning tactics to rank malicious sites higher in search results.
First reported: 06.11.2025 16:002 sources, 7 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Payloads delivered in these attacks include MSHTA executable, PowerShell scripts, and living-off-the-land binaries.
First reported: 06.11.2025 16:002 sources, 8 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Future ClickFix attacks could run entirely in the browser, evading EDR protections.
First reported: 06.11.2025 16:002 sources, 6 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Threat actors are abusing the decades-old Finger protocol to retrieve and execute remote commands on Windows devices.
First reported: 15.11.2025 20:462 sources, 5 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The Finger protocol is used to deliver commands that create a random-named path, download a zip archive disguised as a PDF, and extract a Python malware package.
First reported: 15.11.2025 20:462 sources, 5 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The Python program is executed using pythonw.exe __init__.py, and a callback is made to the attacker's server to confirm execution.
First reported: 15.11.2025 20:462 sources, 5 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
A related batch file indicates that the Python package is an infostealer.
First reported: 15.11.2025 20:462 sources, 5 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Another campaign uses the Finger protocol to retrieve and run commands that look for malware research tools and exit if found.
First reported: 15.11.2025 20:462 sources, 5 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
If no malware analysis tools are found, the commands download a zip archive disguised as PDF files and extract the NetSupport Manager RAT package.
First reported: 15.11.2025 20:462 sources, 5 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The commands configure a scheduled task to launch the remote access malware when the user logs in.
First reported: 15.11.2025 20:462 sources, 5 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The Finger protocol abuse appears to be carried out by a single threat actor conducting ClickFix attacks.
First reported: 15.11.2025 20:462 sources, 5 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Amatera Stealer is an evolution of ACR Stealer, available under a malware-as-a-service (MaaS) model with subscription plans ranging from $199 per month to $1,499 per year.
First reported: 17.11.2025 18:532 sources, 5 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Amatera Stealer targets crypto-wallets, browsers, messaging applications, FTP clients, and email services, employing advanced evasion techniques such as WoW64 SysCalls.
First reported: 17.11.2025 18:532 sources, 5 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Amatera Stealer is packed using PureCrypter, a C#-based multi-functional crypter and loader advertised as a MaaS offering by a threat actor named PureCoder.
First reported: 17.11.2025 18:532 sources, 5 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Amatera Stealer is injected into the MSBuild.exe process to harvest sensitive data and contact an external server to execute a PowerShell command to fetch and run NetSupport RAT.
First reported: 17.11.2025 18:532 sources, 5 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Amatera Stealer checks if the victim machine is part of a domain or has files of potential value, such as crypto wallets, before downloading NetSupport RAT.
First reported: 17.11.2025 18:532 sources, 5 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Recent phishing campaigns have propagated a wide range of malware families, including XWorm, NetSupport RAT, credential stealers, and phishing kits named Cephas and Tycoon 2FA.
First reported: 17.11.2025 18:532 sources, 6 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Tycoon 2FA is a phishing kit that bypasses multi-factor authentication (MFA) and authentication apps by intercepting usernames, passwords, session cookies, and MFA flows in real-time.
First reported: 18.11.2025 17:012 sources, 6 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Tycoon 2FA has been used in over 64,000 attacks this year, primarily targeting Microsoft 365 and Gmail.
First reported: 18.11.2025 17:012 sources, 6 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Tycoon 2FA includes anti-detection layers such as Base64 encoding, LZ string compression, DOM vanishing, CryptoJS obfuscation, automated bot filtering, CAPTCHA challenges, and debugger checks.
First reported: 18.11.2025 17:012 sources, 6 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Tycoon 2FA can lead to total session takeover, allowing attackers to move laterally into SharePoint, OneDrive, email, Teams, HR systems, and finance systems.
First reported: 18.11.2025 17:012 sources, 6 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Legacy MFA methods like SMS codes, push notifications, and TOTP apps are vulnerable to Tycoon 2FA due to their reliance on user behavior.
First reported: 18.11.2025 17:012 sources, 6 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Criminal groups such as Scattered Spider, Octo Tempest, and Storm 1167 are using Tycoon 2FA daily.
First reported: 18.11.2025 17:012 sources, 6 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Phishing-proof MFA solutions, such as Token Ring and Token BioStick, use biometric authentication, proximity-based checks, and domain binding to prevent phishing attacks.
First reported: 18.11.2025 17:012 sources, 6 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Token Ring and Token BioStick solutions are inexpensive, available today, and provide a better user experience with faster authentication times.
First reported: 18.11.2025 17:012 sources, 6 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Tycoon 2FA is a turnkey kit that removes the need for technical skill, making it accessible to anyone with a browser.
First reported: 18.11.2025 17:012 sources, 5 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Tycoon 2FA provides fake login pages and spins up reverse proxy servers, automating the phishing process.
First reported: 18.11.2025 17:012 sources, 6 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Tycoon 2FA intercepts usernames, passwords, session cookies, and MFA flows in real-time, allowing attackers to bypass MFA.
First reported: 18.11.2025 17:012 sources, 6 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Tycoon 2FA includes anti-detection layers such as Base64 encoding, LZ string compression, DOM vanishing, CryptoJS obfuscation, automated bot filtering, CAPTCHA challenges, and debugger checks.
First reported: 18.11.2025 17:012 sources, 6 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Tycoon 2FA can lead to total session takeover, allowing attackers to move laterally into SharePoint, OneDrive, email, Teams, HR systems, and finance systems.
First reported: 18.11.2025 17:012 sources, 6 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Legacy MFA methods like SMS codes, push notifications, and TOTP apps are vulnerable to Tycoon 2FA due to their reliance on user behavior.
First reported: 18.11.2025 17:012 sources, 6 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Criminal groups such as Scattered Spider, Octo Tempest, and Storm 1167 are using Tycoon 2FA daily.
First reported: 18.11.2025 17:012 sources, 6 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Phishing-proof MFA solutions, such as Token Ring and Token BioStick, use biometric authentication, proximity-based checks, and domain binding to prevent phishing attacks.
First reported: 18.11.2025 17:012 sources, 6 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Token Ring and Token BioStick solutions are inexpensive, available today, and provide a better user experience with faster authentication times.
First reported: 18.11.2025 17:012 sources, 6 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
A new operation embedding StealC V2 inside Blender project files has been observed targeting victims for at least six months.
First reported: 24.11.2025 16:003 sources, 5 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The attackers placed manipulated .blend files on platforms such as CGTrader, where users downloaded them as routine 3D assets.
First reported: 24.11.2025 16:003 sources, 5 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
When opened with Blender’s Auto Run feature enabled, the files executed concealed Python scripts that launched a multistage infection.
First reported: 24.11.2025 16:003 sources, 5 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The infection chain began with a tampered Rig_Ui.py script embedded inside the .blend file.
First reported: 24.11.2025 16:003 sources, 5 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
This script fetched a loader from a remote workers.dev domain, which then downloaded a PowerShell stage and two ZIP archives containing Python-based stealers.
First reported: 24.11.2025 16:003 sources, 5 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Once extracted into the Windows temp directory, the malware created LNK files to secure persistence, then used Pyramid C2 channels to retrieve encrypted payloads.
First reported: 24.11.2025 16:003 sources, 5 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
StealC V2, promoted on underground forums since April 2025, has rapidly expanded its feature set.
First reported: 24.11.2025 16:003 sources, 5 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
It now targets more than 23 browsers, over 100 plugins, more than 15 desktop wallets, and a range of messaging, VPN and mail clients.
First reported: 24.11.2025 16:003 sources, 5 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Its pricing, from $200 per month to $800 for 6 months, has made it accessible to low-tier cybercriminals seeking ready-to-use tools.
First reported: 24.11.2025 16:003 sources, 5 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Several indicators of compromise (IoCs) surfaced during the investigation, including malicious .blend files hosted on CGTrader, payload retrieval through multiple workers.dev domains, ZIP archives containing Python stealers and persistence components, and command-and-control (C2) communication across several Pyramid-linked IPs.
First reported: 24.11.2025 16:003 sources, 4 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
ClickFix attack variants have been observed using a realistic-looking Windows Update animation in a full-screen browser page to trick users into executing malicious commands.
First reported: 24.11.2025 22:422 sources, 5 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The new ClickFix variants drop the LummaC2 and Rhadamanthys information stealers.
First reported: 24.11.2025 22:422 sources, 5 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The attack uses steganography to encode the final malware payload inside an image.
First reported: 24.11.2025 22:422 sources, 5 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The process involves multiple stages that use PowerShell code and a .NET assembly (the Stego Loader) responsible for reconstructing the final payload embedded inside a PNG file in an encrypted state.
First reported: 24.11.2025 22:422 sources, 5 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The shellcode holding the infostealer samples is packed using the Donut tool.
First reported: 24.11.2025 22:422 sources, 5 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The Rhadamanthys variant that used the Windows Update lure was first spotted by researchers back in October, before Operation Endgame took down parts of its infrastructure on November 13.
First reported: 24.11.2025 22:422 sources, 5 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The StealC V2 malware used in this campaign was the latest variant of the second major version of the malware.
First reported: 25.11.2025 00:002 sources, 5 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The StealC malware supports exfiltration from 23+ browsers, with server-side credential decryption and compatibility with Chrome 132+.
First reported: 25.11.2025 00:002 sources, 5 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The StealC malware supports exfiltration from 100+ cryptocurrency wallet browser extensions and 15+ cryptocurrency wallet apps.
First reported: 25.11.2025 00:002 sources, 5 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The StealC malware supports exfiltration from Telegram, Discord, Tox, Pidgin, VPN clients (ProtonVPN, OpenVPN), and mail clients (Thunderbird).
First reported: 25.11.2025 00:002 sources, 5 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The StealC malware has an updated UAC bypass mechanism.
First reported: 25.11.2025 00:002 sources, 5 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The malware loader is fetched from a Cloudflare Workers domain.
First reported: 25.11.2025 00:002 sources, 5 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The PowerShell script retrieves two ZIP archives, ZalypaGyliveraV1 and BLENDERX, from attacker-controlled IPs.
First reported: 25.11.2025 00:002 sources, 5 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The archives unpack into the %TEMP% folder and drop LNK files in the Startup directory for persistence.
First reported: 25.11.2025 00:002 sources, 5 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The campaign deploys two payloads: the StealC infostealer and an auxiliary Python stealer, likely used for redundancy.
First reported: 25.11.2025 00:002 sources, 5 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
No security engine on VirusTotal detected the StealC variant analyzed by Morphisec.
First reported: 25.11.2025 00:002 sources, 5 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The campaign has been active for at least six months, involving the implantation of malicious .blend files on platforms like CGTrader.
First reported: 25.11.2025 13:282 sources, 4 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The attack chains involve uploading malicious .blend files to free 3D asset sites such as CGTrader containing a malicious "Rig_Ui.py" script.
First reported: 25.11.2025 13:282 sources, 4 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The malicious "Rig_Ui.py" script is executed as soon as the .blend files are opened with Blender's Auto Run feature enabled.
First reported: 25.11.2025 13:282 sources, 4 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The Rig_Ui.py script fetches a PowerShell script to download two ZIP archives.
First reported: 25.11.2025 13:282 sources, 4 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
One of the ZIP files contains a payload for StealC V2, while the second archive deploys a secondary Python-based stealer on the compromised host.
First reported: 25.11.2025 13:282 sources, 4 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The updated version of StealC, first announced in late April 2025, supports a wide range of information gathering features, allowing data to be extracted from 23 browsers, 100 web plugins and extensions, 15 cryptocurrency wallet apps, messaging services, VPNs, and email clients.
First reported: 25.11.2025 13:282 sources, 4 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The campaign shares similarities with a prior campaign linked to Russian-speaking threat actors that involved impersonating the Electronic Frontier Foundation (EFF) to target the online gaming community and infect them with StealC and Pyramid C2.
First reported: 25.11.2025 13:282 sources, 4 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The assessment is based on tactical similarities in both campaigns, including using decoy documents, evasive techniques, and background execution of malware.
First reported: 25.11.2025 13:282 sources, 4 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Blender's documentation acknowledges the security risk posed by the ability to include Python scripts within blend-files, which can execute arbitrary Python scripts.
First reported: 25.11.2025 13:282 sources, 4 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
A new campaign codenamed JackFix leverages fake adult websites (xHamster, PornHub clones) as its phishing mechanism, likely distributed via malvertising.
First reported: 25.11.2025 16:182 sources, 3 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The JackFix campaign displays highly convincing fake Windows update screens in an attempt to get the victim to run malicious code.
First reported: 25.11.2025 16:182 sources, 3 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The attack heavily leans on obfuscation to conceal ClickFix-related code and blocks users from escaping the full-screen alert by disabling the Escape and F11 buttons, along with F5 and F12 keys.
First reported: 25.11.2025 16:182 sources, 3 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The initial command executed is an MSHTA payload that's launched using the legitimate mshta.exe binary, which contains JavaScript designed to run a PowerShell command to retrieve another PowerShell script from a remote server.
First reported: 25.11.2025 16:182 sources, 3 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The PowerShell script attempts to elevate privileges and creates Microsoft Defender Antivirus exclusions for command-and-control (C2) addresses and paths where the payloads are staged.
First reported: 25.11.2025 16:182 sources, 3 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The PowerShell script serves up to eight different payloads, including Rhadamanthys Stealer, Vidar Stealer 2.0, RedLine Stealer, Amadey, and other unspecified loaders and RATs.
First reported: 25.11.2025 16:182 sources, 3 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The threat actor often changes the URI used to host the first mshta.exe stage and has been observed moving from hosting the second stage on the domain securitysettings.live to xoiiasdpsdoasdpojas.com, although both point to the same IP address 141.98.80.175.
First reported: 25.11.2025 16:182 sources, 3 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Storm-0249 abuses endpoint detection and response (EDR) solutions and trusted Microsoft Windows utilities to load malware, establish communication, and persistence in preparation for ransomware attacks.
First reported: 09.12.2025 17:241 source, 2 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Storm-0249 has moved beyond mass phishing and adopted stealthier, more advanced methods that prove effective and difficult for defenders to counter.
First reported: 09.12.2025 17:241 source, 2 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Storm-0249 leveraged the SentinelOne EDR components to hide malicious activity, but the same method works with other EDR products.
First reported: 09.12.2025 17:241 source, 2 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The attack started with ClickFix social engineering that tricked users into pasting and executing curl commands in the Windows Run dialog to download a malicious MSI package with SYSTEM privileges.
First reported: 09.12.2025 17:241 source, 2 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
A malicious PowerShell script is fetched from a spoofed Microsoft domain, which is piped straight onto the system's memory, never touching the disk and thus evading antivirus detection.
First reported: 09.12.2025 17:241 source, 2 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The MSI file drops a malicious DLL (SentinelAgentCore.dll), which is placed strategically alongside the pre-existing, legitimate SentinelAgentWorker.exe, which is already installed as part of the victim's SentinelOne EDR.
First reported: 09.12.2025 17:241 source, 2 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The attacker loads the DLL using the signed SentinelAgentWorker (DLL sideloading), executing the file within the trusted, privileged EDR process and obtaining stealthy persistence that survives operating system updates.
First reported: 09.12.2025 17:241 source, 2 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The legitimate process runs the attacker's code, appearing as routine SentinelOne activity to security tools and bypassing detection.
First reported: 09.12.2025 17:241 source, 2 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Once the attacker gains access, they use the SentinelOne component to collect system identifiers through legitimate Windows utilities like reg.exe and findstr.exe, and to funnel encrypted HTTPS command-and-control (C2) traffic.
First reported: 09.12.2025 17:241 source, 2 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Registry queries and string searches conducted from within a trusted EDR process are treated as routine and ignored by security mechanisms.
First reported: 09.12.2025 17:241 source, 2 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The compromised systems are profiled using 'MachineGuid,' a unique hardware-based identifier that ransomware groups like LockBit and ALPHV use for binding encryption keys to specific victims.
First reported: 09.12.2025 17:241 source, 2 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The abuse of trusted, signed EDR processes bypasses nearly all traditional monitoring.
First reported: 09.12.2025 17:241 source, 2 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
System administrators are recommended to rely on behavior-based detection that identifies trusted processes loading unsigned DLLs from non-standard paths.
First reported: 09.12.2025 17:241 source, 2 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
It is helpful to set stricter controls for curl, PowerShell, and LoLBin execution.
First reported: 09.12.2025 17:241 source, 2 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
ConsentFix is a new variant of the ClickFix attack that abuses the Azure CLI OAuth app to hijack Microsoft accounts without requiring a password or bypassing MFA verifications.
First reported: 11.12.2025 17:101 source, 2 articlesShow sources
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
ConsentFix tricks victims into completing the Azure CLI OAuth flow and steals the resulting authorization code, which is exchanged for full account access.
First reported: 11.12.2025 17:101 source, 2 articlesShow sources
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The attack starts with victims landing on a compromised, legitimate website that ranks high on Google Search results.
First reported: 11.12.2025 17:101 source, 2 articlesShow sources
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Victims are shown a fake Cloudflare Turnstile CAPTCHA widget that asks for a valid business email address, filtering out bots and non-targets.
First reported: 11.12.2025 17:101 source, 2 articlesShow sources
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Victims are instructed to click a 'Sign in' button that opens a legitimate Microsoft URL in a new tab, leading to an Azure login page.
First reported: 11.12.2025 17:101 source, 2 articlesShow sources
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The attack completes when victims paste the URL containing the Azure CLI OAuth authorization code into the malicious page, granting attackers access to the Microsoft account via Azure CLI.
First reported: 11.12.2025 17:101 source, 2 articlesShow sources
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The attack triggers only once per victim IP address, preventing repeated phishing attempts on the same IP.
First reported: 11.12.2025 17:101 source, 2 articlesShow sources
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
Defenders are advised to monitor for unusual Azure CLI login activity, such as logins from new IP addresses, and to check for legacy Graph scopes used by attackers to evade detection.
First reported: 11.12.2025 17:101 source, 2 articlesShow sources
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
-
The BitB phishing technique was developed by security researcher mr.d0x in 2022.
First reported: 12.01.2026 23:052 sources, 2 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
Threat actors steal Facebook accounts to spread scams, harvest personal data, or commit identity fraud.
First reported: 12.01.2026 23:052 sources, 2 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
In a BitB attack, users who visit attacker-controlled webpages are presented with a fake browser pop-up containing a login form.
First reported: 12.01.2026 23:052 sources, 2 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
The pop-up is implemented using an iframe that imitates the authentication interface of legitimate platforms and can be customized with a window title and URL that make the deception more difficult to detect.
First reported: 12.01.2026 23:052 sources, 2 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
Recent phishing campaigns targeting Facebook users impersonate law firms claiming copyright infringement, threatening imminent account suspension, or Meta security notifications about unauthorized logins.
First reported: 12.01.2026 23:052 sources, 2 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
To avoid detection and to increase the sense of legitimacy, cybercriminals added shortened URLs and fake Meta CAPTCHA pages.
First reported: 12.01.2026 23:052 sources, 2 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
In the final stage of the attack, victims are prompted to log in by entering their Facebook credentials in a fake pop-up window.
First reported: 12.01.2026 23:052 sources, 2 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
Trellix discovered a high number of phishing pages hosted on legitimate cloud platforms like Netlify and Vercel, which mimic Meta's Privacy Center portal, redirecting users to pages disguised as appeal forms that collected personal information.
First reported: 12.01.2026 23:052 sources, 2 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
These campaigns constitute a significant evolution compared to standard Facebook phishing campaigns that security researchers typically observe.
First reported: 12.01.2026 23:052 sources, 2 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
The key shift lies in the abuse of trusted infrastructure, utilizing legitimate cloud hosting services like Netlify and Vercel, and URL shorteners to bypass traditional security filters and lend a false sense of security to phishing pages.
First reported: 12.01.2026 23:052 sources, 2 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
Most critically, the emergence of the Browser-in-the-Browser (BitB) technique represents a major escalation. By creating a custom-built, fake login pop-up window within the victim's browser, this method capitalizes on user familiarity with authentication flows, making credential theft nearly impossible to detect visually.
First reported: 12.01.2026 23:052 sources, 2 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
Cybercriminals are increasingly using the browser-in-the-browser (BitB) attack technique to steal Facebook login credentials.
First reported: 13.01.2026 16:401 source, 1 articleShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
Phishing emails lure users with messages claiming copyright infringement, unauthorized login attempts, or account shutdown due to suspicious activity.
First reported: 13.01.2026 16:401 source, 1 articleShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
Attackers use shortened URLs to make phishing links appear more legitimate.
First reported: 13.01.2026 16:401 source, 1 articleShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
The BitB attack involves a fake browser pop-up window that mimics the real Facebook login page, including the real Facebook login page URL hardcoded into the authentication window.
First reported: 13.01.2026 16:401 source, 1 articleShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
Attackers deploy a fake CAPTCHA window before the login page to increase the appearance of legitimacy.
First reported: 13.01.2026 16:401 source, 1 articleShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
Phishing pages ask for personal information such as name, email address, phone number, and date of birth before requesting password confirmation.
First reported: 13.01.2026 16:401 source, 1 articleShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
The attacks aim to steal sensitive personal information, usernames, and passwords for further fraud.
First reported: 13.01.2026 16:401 source, 1 articleShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
Trellix recommends applying two-factor authentication (2FA) to block account takeovers even if credentials are stolen.
First reported: 13.01.2026 16:401 source, 1 articleShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
-
Users are advised to treat unexpected requests with suspicion and log in directly via Facebook's official website instead of following unfamiliar links.
First reported: 13.01.2026 16:401 source, 1 articleShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
Similar Happenings
DarkSpectre Campaigns Target 8.8 Million Users with Malicious Browser Extensions
A Chinese threat actor, DarkSpectre, has been linked to three malicious browser extension campaigns—ShadyPanda, GhostPoster, and The Zoom Stealer—which have collectively impacted 8.8 million users across Google Chrome, Microsoft Edge, and Mozilla Firefox over seven years. The campaigns facilitate data theft, search query hijacking, affiliate fraud, and corporate espionage by exfiltrating meeting-related data from video conferencing platforms. The extensions, some of which are still active, use delayed activation and benign updates to evade detection and build trust before deploying malicious functionality.
Sha1-Hulud Supply Chain Attack Results in $8.5 Million Trust Wallet Chrome Extension Hack
On December 24, 2025, users of the Trust Wallet Chrome extension reported significant cryptocurrency losses after a compromised update (version 2.68.0) was released. The update contained malicious code that exfiltrated sensitive wallet data to an external server. Trust Wallet confirmed the security incident and released a patched version (2.69). Losses are estimated to exceed $8.5 million, with ongoing investigations into the incident. The malicious code iterated through all wallets stored in the extension and triggered a mnemonic phrase request for each wallet. The encrypted mnemonic was decrypted using the password or passkey entered during wallet unlock and sent to the attacker's server. The stolen funds include about $3 million in Bitcoin, $431 in Solana, and more than $3 million in Ethereum. The incident has claimed hundreds of victims, and Trust Wallet is actively finalizing the process to refund the impacted users. The stolen funds have been moved through centralized exchanges and cross-chain bridges for laundering and swapping. The backdoor incident originated from malicious source code modification within the internal Trust Wallet extension codebase. The attacker directly tampered with the application's own code and leveraged the legitimate PostHog analytics library as the data-exfiltration channel. There is a possibility that the incident is the work of a nation-state actor, and Changpeng Zhao hinted that the exploit was most likely carried out by an insider. Trust Wallet confirmed that approximately 2,596 wallets were drained in the attack and received around 5,000 claims, indicating a significant number of false or duplicate submissions. Trust Wallet has launched a dedicated claim form for affected users and warned about ongoing phishing campaigns.
Malicious npm package 'lotusbail' steals WhatsApp credentials and messages
A malicious npm package named 'lotusbail' has been discovered, which poses as a legitimate WhatsApp Web API library. The package steals WhatsApp authentication tokens, session keys, intercepts messages, and exfiltrates contact lists and media files. It has been available for at least six months with over 56,000 downloads. The package also links the attacker's device to the victim's WhatsApp account, granting persistent access even after removal. Researchers recommend checking for rogue linked devices and monitoring runtime behavior for unexpected outbound connections. The package was uploaded by a user named 'seiren_primrose' in May 2025 and has been downloaded 711 times in the last week. It uses a malicious WebSocket wrapper to capture credentials and chats, and the stolen data is transmitted to an attacker-controlled URL in encrypted form. The package also uses a hard-coded pairing code to hijack the device linking process and enters into an infinite loop trap when debugging tools are detected.
OAuth Device Code Phishing Campaigns Target Microsoft 365 Accounts
A surge in phishing campaigns exploiting Microsoft’s OAuth device code authorization flow has been observed, targeting Microsoft 365 accounts. Both state-aligned and financially motivated actors are using social engineering to trick users into approving malicious applications, leading to account takeover and data theft. The attacks leverage the OAuth 2.0 device authorization grant, a legitimate process designed for devices with limited input capabilities. Once victims enter a device code generated by an attacker-controlled application, the threat actor receives a valid access token, granting control over the compromised account. The campaigns use QR codes, embedded buttons, and hyperlinked text to initiate the attack chain, often claiming to involve document sharing, token reauthorization, or security verification. The growth of these campaigns is linked to readily available phishing tools like SquarePhish2 and Graphish, which simplify device code abuse and require limited technical skill. Proofpoint observed financially motivated actor TA2723 and Russia-linked group UNK_AcademicFlare adopting this technique, targeting various sectors in the US and Europe. Organizations are advised to strengthen OAuth controls and train users to avoid entering device codes from untrusted sources. The activity, ongoing since September 2025, is being tracked by Proofpoint under the moniker UNK_AcademicFlare. The attacks involve using compromised email addresses belonging to government and military organizations to strike entities within government, think tanks, higher education, and transportation sectors in the U.S. and Europe. The adversary claims to share a link to a document that includes questions or topics for the email recipient to review before the meeting. The URL points to a Cloudflare Worker URL that mimics the compromised sender's Microsoft OneDrive account and instructs the victim to copy the provided code and click 'Next' to access the supposed document. Device code phishing was documented in detail by both Microsoft and Volexity in February 2025, attributing the use of the attack method to Russia-aligned clusters such as Storm-2372, APT29, UTA0304, and UTA0307. The October 2025 campaign is assessed to have been fueled by the ready availability of crimeware offerings like the Graphish phishing kit and red-team tools such as SquarePhish. To counter the risk posed by device code phishing, the best option is to create a Conditional Access policy using the Authentication Flows condition to block device code flow for all users. If that's not feasible, it's advised to use a policy that uses an allow-list approach to allow device code authentication for approved users, operating systems, or IP ranges.
GhostPoster Campaign Uses Steganography in Firefox Addon Logos
A campaign named GhostPoster has been discovered, which hides malicious JavaScript code in the PNG logos of Firefox extensions. These extensions, with over 50,000 downloads, monitor browser activity and plant a backdoor. The hidden script acts as a loader that fetches the main payload from a remote server, retrieving it only 10% of the time to evade detection. The campaign involves 17 compromised extensions, primarily from popular categories like VPNs, weather, and translation tools. The payload can hijack affiliate links, inject tracking code, and commit click and ad fraud. Users are advised to remove these extensions and reset passwords for critical accounts.