UNC5518 Access-as-a-Service Campaign via ClickFix and Fake CAPTCHA Pages
Summary
Hide ▲
Show ▼
Microsoft has disclosed a new DNS-based variant of the ClickFix social engineering attack, while CTM360 reports an active campaign abusing Google Groups and Google-hosted infrastructure to distribute **Lumma Stealer** and a trojanized Chromium-based browser named *Ninja Browser*. The Google Groups campaign embeds organization-specific keywords into posts to lure victims into downloading oversized (950MB) password-protected archives or trojanized browsers, leveraging URL shorteners and Google Docs/Drive redirectors to evade detection. The Windows payload deploys Lumma Stealer via AutoIt-compiled executables, exfiltrating credentials and session cookies to C2 domains like `healgeni[.]live`. Linux targets receive *Ninja Browser*, which silently installs malicious extensions (e.g., *NinjaBrowserMonetisation*) capable of tracking, script injection, and remote command execution, while maintaining persistence through scheduled tasks. Earlier phases of this broader ClickFix ecosystem included DNS-based staging via `nslookup` to retrieve ModeloRAT, CastleLoader-driven Lumma Stealer surges, and macOS-focused campaigns delivering Odyssey Stealer. The evolution now integrates **trusted platform abuse** (Google Groups, DNS, blockchain), **cross-platform targeting** (Windows/Linux/macOS), and **multi-stage loaders** (AutoIt, Python, VBScript) to maximize evasion. Threat actors continue refining tradecraft, blending social engineering with technical evasion—such as oversized archives, obfuscated extensions, and SaaS infrastructure—to bypass security controls and maintain persistence despite 2025 law enforcement disruptions.
Timeline
-
15.02.2026 18:30 1 articles · 6h ago
Google Groups campaign distributes Lumma Stealer and Ninja Browser via weaponized SaaS infrastructure
CTM360 reports an active malware campaign abusing **over 4,000 malicious Google Groups** and **3,500 Google-hosted URLs** to distribute **Lumma Stealer** (Windows) and a trojanized Chromium-based browser named *Ninja Browser* (Linux). The attack chain begins with **social engineering in Google Groups**, where threat actors infiltrate industry forums to post technical discussions embedding malicious download links (e.g., "Download {Organization_Name} for Windows 10"). **Windows Infection Flow:** - Victims receive a **950MB password-protected archive** padded with null bytes to evade antivirus file-size thresholds. - The archive decompresses to ~33MB, launching an **AutoIt-compiled executable** that reassembles segmented binaries and decrypts a **memory-resident Lumma Stealer payload**. - Observed behaviors include browser credential exfiltration, session cookie harvesting, shell command execution, and HTTP POST requests to C2 infrastructure (e.g., `healgeni[.]live`) using `multipart/form-data` to mask exfiltrated content. **Linux Infection Flow:** - Victims are redirected to download *Ninja Browser*, a trojanized Chromium fork marketed as privacy-focused. - The browser silently installs the *NinjaBrowserMonetisation* extension, which: - Tracks users via **unique identifiers**. - Injects scripts and manipulates **browser tabs/cookies**. - Uses **heavily obfuscated JavaScript** (XOR/Base56-like encoding). - Polls attacker-controlled servers daily via **scheduled tasks** for silent updates. - Defaults to a **Russian-based search engine** (*X-Finder*) and redirects to suspicious AI-themed pages. **Infrastructure & Evasion:** - Abuses **Google’s trusted ecosystem** (Groups, Docs, Drive redirectors) to bypass filtering and URL shorteners to evade detection. - Linked to IPs **152.42.139[.]18**, **89.111.170[.]100**, and domains like `ninja-browser[.]com` and `nbdownload[.]space`. - Represents a broader trend of **SaaS platform weaponization**, where attackers exploit legitimate services to host and distribute malware while evading traditional defenses. **Defensive Recommendations:** - Inspect **shortened URLs** and **Google Docs/Drive redirect chains**. - Block IoCs at **firewall/EDR levels** and monitor for **scheduled task creation**. - Educate users against downloading software from **public forums** without verification. - Audit **browser extension installations** for unauthorized or obfuscated components.
Show sources
- CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups — www.bleepingcomputer.com — 15.02.2026 18:30
-
15.02.2026 16:10 1 articles · 8h ago
DNS-based ClickFix variant uses nslookup for malware staging
Microsoft disclosed a new DNS-based ClickFix variant that abuses the `nslookup` command to stage and execute malware payloads. The attack begins with a command executed via the Windows Run dialog, performing a DNS lookup against a hard-coded external server to extract a `Name:` response, which is then executed as the second-stage payload. This technique uses DNS as a lightweight staging or signaling channel, blending malicious activity with normal network traffic and adding a validation layer before payload execution. The attack chain downloads a ZIP archive from the domain `azwsappdev[.]com`, extracts a malicious Python script to conduct reconnaissance and run discovery commands, and drops a VBScript responsible for launching **ModeloRAT**, a Python-based remote access trojan. Persistence is established by creating an LNK file in the Windows Startup folder, ensuring the malware runs at each system boot. The disclosure coincides with a surge in **Lumma Stealer** activity, driven by ClickFix-style fake CAPTCHA campaigns deploying **CastleLoader**, an AutoIt-based malware loader. CastleLoader checks for virtualization and security software before decrypting and launching Lumma Stealer in memory, with infections predominantly observed in India, France, and the U.S. Campaigns also distribute fake NSIS installers and VBA scripts, using scheduled tasks for persistence. One CastleLoader domain (`testdomain123123[.]shop`) was identified as a Lumma Stealer C2, suggesting potential collaboration or shared infrastructure between the operators. Additionally, macOS-focused ClickFix campaigns are delivering **Odyssey Stealer** (a rebrand of Poseidon Stealer), which targets cryptocurrency wallets and functions as a full RAT with SOCKS5 proxy capabilities. A **ClearFake** campaign leverages fake CAPTCHA lures on compromised WordPress sites to execute an HTA file and deploy Lumma Stealer, alongside **EtherHiding**—a technique using BNB Smart Chain contracts to fetch payloads from GitHub, blending malicious traffic with legitimate Web3 activity. The article underscores the growing sophistication of ClickFix, now incorporating DNS staging, multi-platform loaders, and blockchain-based evasion techniques to maintain resilience against takedown efforts.
Show sources
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
27.01.2026 16:38 1 articles · 19d ago
New ClickFix campaign abuses SyncAppvPublishingServer.vbs to distribute Amatera Stealer
The new campaign abuses SyncAppvPublishingServer.vbs, a signed Visual Basic Script associated with App-V, to retrieve and execute an in-memory loader from an external server using wscript.exe. The campaign uses a fake CAPTCHA verification prompt to trick users into pasting and executing a malicious command on the Windows Run dialog. The obfuscated loader runs checks to ensure that it's not run within sandboxed environments. The loader fetches configuration data from a public Google Calendar (ICS) file, turning a trusted third-party service into a dead drop resolver. The campaign retrieves additional loader stages, including a PowerShell script that functions as an intermediate loader to execute the next stage directly in memory. The resulting script is decrypted, GZip decompressed in memory, and run using Invoke-Expression, ultimately culminating in the execution of a shellcode loader designed to launch Amatera Stealer. The campaign targets enterprise managed systems, as the virtualization solution is built only into Enterprise and Education editions of Windows 10 and Windows 11, along with modern Windows Server versions. The campaign is highly sophisticated and evasive, using in-memory PowerShell code execution and relying on blockchain and popular CDNs to avoid communicating with any infrastructure that's not a legitimate service. The campaign uses a multi-stage attack chain that includes a fake CAPTCHA verification prompt, abuse of SyncAppvPublishingServer.vbs, and retrieval of configuration data from a public Google Calendar file. The campaign is part of the broader fake CAPTCHA ecosystem, which uses trusted web infrastructure as the delivery surface, with Cloudflare-style challenges acting as a conduit for clipboard-driven execution of PowerShell commands, VB Scripts, MSI installers, and browser-native frameworks like Matrix Push C2.
Show sources
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
19.01.2026 11:09 2 articles · 27d ago
CrashFix campaign delivers ModeloRAT via malicious Chrome extension
A new campaign codenamed CrashFix uses a malicious Chrome extension to deliver ModeloRAT via ClickFix-style browser crash lures. The campaign, tracked as KongTuke, uses a malicious Chrome extension named 'NexShield – Advanced Web Guardian' to crash the browser and trick victims into executing commands. The extension masquerades as a legitimate ad blocker and claims to protect users against ads, trackers, malware, and intrusive content. The extension was downloaded at least 5,000 times and is a near-identical clone of uBlock Origin Lite. The extension displays a fake security warning claiming the browser had 'stopped abnormally' and prompts users to run a 'scan'. The scan presents a bogus security alert instructing victims to open the Windows Run dialog and execute a command copied to the clipboard. Executing the command causes the browser to freeze and crash by launching a denial-of-service (DoS) attack that creates new runtime port connections through an infinite loop. The extension transmits a unique ID to an attacker-controlled server, allowing operators to track victims. The extension uses a delayed execution mechanism, triggering malicious behavior 60 minutes after installation and then every 10 minutes. The extension incorporates anti-analysis techniques to disable right-click context menus and prevent the use of developer tools. The CrashFix command employs the legitimate Windows utility, finger.exe, to retrieve and execute the next-stage payload from the attacker's server. The payload is a PowerShell command that retrieves a secondary PowerShell script, which uses multiple layers of Base64 encoding and XOR operations to conceal the next-stage malware. The decrypted blob scans running processes for over 50 analysis tools and virtual machine indicators, ceasing execution if found. The script checks if the machine is domain-joined or standalone and sends an HTTP POST request to the server containing a list of installed antivirus products and a flag indicating the machine type. For domain-joined machines, the campaign deploys ModeloRAT, a fully-featured Python-based Windows RAT that uses RC4 encryption for C2 communications. ModeloRAT sets up persistence using Registry and facilitates the execution of binaries, DLLs, Python scripts, and PowerShell commands. ModeloRAT is equipped to update or terminate itself upon receiving specific commands and implements varied beaconing logic to avoid detection. For standalone workstations, the campaign ends with the C2 server responding with a test payload message, indicating it may still be in the testing phase. KongTuke's CrashFix campaign demonstrates how threat actors evolve their social engineering tactics by impersonating trusted projects and exploiting user frustration. Huntress attributes the analyzed CrashFix attack to a threat actor named 'KongTuke', whose operations have been on the company's radar since early 2025. Based on the recent discovery, the researchers believe that KongTuke is evolving and becoming more interested in enterprise networks, which are more lucrative for cybercriminals. Falling for ClickFix attacks can be prevented by making sure that the effect of any external command executed on the system is well understood. Furthermore, installing browser extensions from trusted publishers or sources should keep you safe from CrashFix attacks or other threats. Users who installed NexShield should perform a full system cleanup, as uninstalling the extension does not remove all payloads, such as ModeloRAT or other malicious scripts.
Show sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
-
17.11.2025 18:53 3 articles · 3mo ago
EVALUSION ClickFix campaign delivers Amatera Stealer and NetSupport RAT
A new EVALUSION ClickFix campaign has been discovered, delivering Amatera Stealer and NetSupport RAT. Amatera Stealer, an evolution of ACR Stealer, is available under a malware-as-a-service (MaaS) model and targets crypto-wallets, browsers, messaging applications, FTP clients, and email services. It employs advanced evasion techniques such as WoW64 SysCalls and is packed using PureCrypter. The stealer is injected into the MSBuild.exe process to harvest sensitive data and contact an external server to execute a PowerShell command to fetch and run NetSupport RAT. The campaign also involves phishing attacks using various malware families and phishing kits named Cephas and Tycoon 2FA. Tycoon 2FA is a phishing kit that bypasses multi-factor authentication (MFA) and authentication apps by intercepting usernames, passwords, session cookies, and MFA flows in real-time. It has been used in over 64,000 attacks this year, primarily targeting Microsoft 365 and Gmail. The kit includes anti-detection layers and can lead to total session takeover, allowing attackers to move laterally into various enterprise systems. Legacy MFA methods like SMS codes, push notifications, and TOTP apps are vulnerable to Tycoon 2FA due to their reliance on user behavior. Criminal groups such as Scattered Spider, Octo Tempest, and Storm 1167 are using Tycoon 2FA daily. Phishing-proof MFA solutions, such as Token Ring and Token BioStick, use biometric authentication, proximity-based checks, and domain binding to prevent phishing attacks. Token Ring and Token BioStick solutions are inexpensive, available today, and provide a better user experience with faster authentication times.
Show sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
-
17.09.2025 17:01 2 articles · 5mo ago
MetaStealer attack uses fake Cloudflare Turnstile and MSI package
The MetaStealer attack, a variant of the ClickFix family, uses a fake Cloudflare Turnstile lure and an MSI package disguised as a PDF to deploy the MetaStealer infostealer malware. The attack involves a multi-stage infection chain that includes a DLL sideloading technique using a legitimate SentinelOne executable. The MetaStealer attack targets crypto wallets and other sensitive information, using a combination of social engineering and technical evasion techniques to deploy malware.
Show sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
-
16.09.2025 15:00 9 articles · 5mo ago
FileFix attack impersonates Meta and deploys StealC infostealer
A Russian-linked campaign delivers the StealC V2 information stealer malware through malicious Blender files uploaded to 3D model marketplaces like CGTrader. The campaign exploits Blender's Auto Run feature to execute embedded Python scripts that fetch a malware loader from a Cloudflare Workers domain. The loader then retrieves a PowerShell script that downloads two ZIP archives, which unpack into the %TEMP% folder and drop LNK files in the Startup directory for persistence. The campaign deploys two payloads: the StealC infostealer and an auxiliary Python stealer. The StealC malware used in this campaign is the latest variant of the second major version, with expanded data-stealing capabilities and support for exfiltration from various browsers, cryptocurrency wallets, messaging apps, VPN clients, and mail clients. Despite being documented since 2023, the malware remains elusive to anti-virus products, with no security engine on VirusTotal detecting the analyzed variant. The campaign has been active for at least six months, involving the implantation of malicious .blend files on platforms like CGTrader. The attack chains involve uploading malicious .blend files containing a malicious "Rig_Ui.py" script, which is executed as soon as the files are opened with Blender's Auto Run feature enabled. The Rig_Ui.py script fetches a PowerShell script to download two ZIP archives, one of which contains a payload for StealC V2, while the second archive deploys a secondary Python-based stealer on the compromised host. The updated version of StealC supports a wide range of information gathering features, allowing data to be extracted from various browsers, web plugins, cryptocurrency wallet apps, messaging services, VPNs, and email clients. The campaign shares similarities with a prior campaign linked to Russian-speaking threat actors, involving impersonating the Electronic Frontier Foundation (EFF) to target the online gaming community and infect them with StealC and Pyramid C2. Blender's documentation acknowledges the security risk posed by the ability to include Python scripts within blend-files, which can execute arbitrary Python scripts. Cybersecurity researchers have disclosed a cross-site scripting (XSS) vulnerability in the web-based control panel used by operators of the StealC information stealer. By exploiting this vulnerability, researchers gathered system fingerprints, monitored active sessions, and stole cookies from the StealC control panel. The StealC malware, first emerged in January 2023 under a malware-as-a-service (MaaS) model, has been distributed via YouTube as part of a campaign known as the YouTube Ghost Network. The malware has also been propagated via rogue Blender Foundation files and a social engineering tactic known as FileFix. StealC has received updates, including Telegram bot integration for notifications, enhanced payload delivery, and a redesigned panel, codenamed StealC V2. The source code for the StealC administration panel was leaked, providing insights into the threat actor's operations. A StealC customer named YouTubeTA used Google's video-sharing platform to distribute the stealer by advertising cracked versions of Adobe Photoshop and Adobe After Effects, amassing over 5,000 logs containing 390,000 stolen passwords and more than 30 million stolen cookies. YouTubeTA is suspected of seizing control of legitimate YouTube accounts to promote cracked software and using ClickFix-like fake CAPTCHA lures to distribute StealC. The StealC panel allows operators to create multiple users and differentiate between admin users and regular users. YouTubeTA operated from an Eastern European country where Russian is commonly spoken, using an Apple M3 processor-based machine. An operational security blunder revealed YouTubeTA's real IP address, associated with a Ukrainian provider called TRK Cable TV. The StealC developers exhibited weaknesses in cookie security and panel code quality, allowing researchers to gather data about their customers.
Show sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
-
21.08.2025 19:25 14 articles · 5mo ago
UNC5518 Access-as-a-Service Campaign via ClickFix and Fake CAPTCHA Pages
The ClickFix attacks now feature videos that guide victims through the self-infection process, a timer to pressure targets into taking risky actions, and automatic detection of the operating system to provide the correct commands. The attacks are primarily promoted through malvertizing on Google Search and exploit known flaws on outdated WordPress plugins to compromise legitimate sites. The payloads delivered in these attacks include MSHTA executable, PowerShell scripts, and living-off-the-land binaries. Additionally, threat actors have been abusing the decades-old Finger protocol to retrieve and execute remote commands on Windows devices. The Finger protocol is used to deliver commands that create a random-named path, download a zip archive disguised as a PDF, and extract a Python malware package. The Python program is executed using pythonw.exe __init__.py, and a callback is made to the attacker's server to confirm execution. A related batch file indicates that the Python package is an infostealer. Another campaign uses the Finger protocol to retrieve and run commands that look for malware research tools and exit if found. If no malware analysis tools are found, the commands download a zip archive disguised as PDF files and extract the NetSupport Manager RAT package. The commands configure a scheduled task to launch the remote access malware when the user logs in. A new EVALUSION ClickFix campaign has been discovered, delivering Amatera Stealer and NetSupport RAT. Amatera Stealer, an evolution of ACR Stealer, is available under a malware-as-a-service (MaaS) model and targets crypto-wallets, browsers, messaging applications, FTP clients, and email services. It employs advanced evasion techniques such as WoW64 SysCalls and is packed using PureCrypter. The stealer is injected into the MSBuild.exe process to harvest sensitive data and contact an external server to execute a PowerShell command to fetch and run NetSupport RAT. ClickFix attack variants have been observed using a realistic-looking Windows Update animation in a full-screen browser page to trick users into executing malicious commands. The new ClickFix variants drop the LummaC2 and Rhadamanthys information stealers. The attack uses steganography to encode the final malware payload inside an image. The process involves multiple stages that use PowerShell code and a .NET assembly (the Stego Loader) responsible for reconstructing the final payload embedded inside a PNG file in an encrypted state. The shellcode holding the infostealer samples is packed using the Donut tool. The Rhadamanthys variant that used the Windows Update lure was first spotted by researchers back in October, before Operation Endgame took down parts of its infrastructure on November 13. A new campaign codenamed JackFix leverages fake adult websites (xHamster, PornHub clones) as its phishing mechanism, likely distributed via malvertising. The JackFix campaign displays highly convincing fake Windows update screens in an attempt to get the victim to run malicious code. The attack heavily leans on obfuscation to conceal ClickFix-related code and blocks users from escaping the full-screen alert by disabling the Escape and F11 buttons, along with F5 and F12 keys. The initial command executed is an MSHTA payload that's launched using the legitimate mshta.exe binary, which contains JavaScript designed to run a PowerShell command to retrieve another PowerShell script from a remote server. The PowerShell script attempts to elevate privileges and creates Microsoft Defender Antivirus exclusions for command-and-control (C2) addresses and paths where the payloads are staged. The PowerShell script serves up to eight different payloads, including Rhadamanthys Stealer, Vidar Stealer 2.0, RedLine Stealer, Amadey, and other unspecified loaders and RATs. The threat actor often changes the URI used to host the first mshta.exe stage and has been observed moving from hosting the second stage on the domain securitysettings.live to xoiiasdpsdoasdpojas.com, although both point to the same IP address 141.98.80.175. An initial access broker tracked as Storm-0249 is abusing endpoint detection and response solutions and trusted Microsoft Windows utilities to load malware, establish communication, and persistence in preparation for ransomware attacks. The threat actor has moved beyond mass phishing and adopted stealthier, more advanced methods that prove effective and difficult for defenders to counter. In one attack analyzed by researchers at cybersecurity company ReliaQuest, Storm-0249 leveraged the SentinelOne EDR components to hide malicious activity. The attack started with ClickFix social engineering that tricked users into pasting and executing curl commands in the Windows Run dialog to download a malicious MSI package with SYSTEM privileges. A malicious PowerShell script is also fetched from a spoofed Microsoft domain, which is piped straight onto the system's memory, never touching the disk and thus evading antivirus detection. The MSI file drops a malicious DLL (SentinelAgentCore.dll), which is placed strategically alongside the pre-existing, legitimate SentinelAgentWorker.exe, which is already installed as part of the victim's SentinelOne EDR. Next, the attacker loads the DLL using the signed SentinelAgentWorker (DLL sideloading), executing the file within the trusted, privileged EDR process and obtaining stealthy persistence that survives operating system updates. Once the attacker gains access, they use the SentinelOne component to collect system identifiers through legitimate Windows utilities like reg.exe and findstr.exe, and to funnel encrypted HTTPS command-and-control (C2) traffic. The compromised systems are profiled using 'MachineGuid,' a unique hardware-based identifier that ransomware groups like LockBit and ALPHV use for binding encryption keys to specific victims. The abuse of trusted, signed EDR processes bypasses nearly all traditional monitoring. The researchers recommend that system administrators rely on behavior-based detection that identifies trusted processes loading unsigned DLLs from non-standard paths. Furthermore, it is helpful to set stricter controls for curl, PowerShell, and LoLBin execution. A new variation of the ClickFix attack dubbed 'ConsentFix' abuses the Azure CLI OAuth app to hijack Microsoft accounts without the need for a password or to bypass multi-factor authentication (MFA) verifications. ConsentFix tricks victims into completing the Azure CLI OAuth flow and steals the resulting authorization code, which is exchanged for full account access. The attack starts with victims landing on a compromised, legitimate website that ranks high on Google Search results. Victims are shown a fake Cloudflare Turnstile CAPTCHA widget that asks for a valid business email address, filtering out bots and non-targets. Victims are instructed to click a 'Sign in' button that opens a legitimate Microsoft URL in a new tab, leading to an Azure login page. The attack completes when victims paste the URL containing the Azure CLI OAuth authorization code into the malicious page, granting attackers access to the Microsoft account via Azure CLI. The attack triggers only once per victim IP address, preventing repeated phishing attempts on the same IP. Defenders are advised to monitor for unusual Azure CLI login activity, such as logins from new IP addresses, and to check for legacy Graph scopes used by attackers to evade detection. Over the past six months, hackers have increasingly relied on the browser-in-the-browser (BitB) method to trick users into providing Facebook account credentials. The BitB phishing technique was developed by security researcher mr.d0x in 2022. In a BitB attack, users who visit attacker-controlled webpages are presented with a fake browser pop-up containing a login form. The pop-up is implemented using an iframe that imitates the authentication interface of legitimate platforms and can be customized with a window title and URL that make the deception more difficult to detect. Recent phishing campaigns targeting Facebook users impersonate law firms claiming copyright infringement, threatening imminent account suspension, or Meta security notifications about unauthorized logins. To avoid detection and to increase the sense of legitimacy, cybercriminals added shortened URLs and fake Meta CAPTCHA pages. In the final stage of the attack, victims are prompted to log in by entering their Facebook credentials in a fake pop-up window. Trellix discovered a high number of phishing pages hosted on legitimate cloud platforms like Netlify and Vercel, which mimic Meta's Privacy Center portal, redirecting users to pages disguised as appeal forms that collected personal information. These campaigns constitute a significant evolution compared to standard Facebook phishing campaigns that security researchers typically observe. A new campaign codenamed CrashFix uses a malicious Chrome extension to deliver ModeloRAT via ClickFix-style browser crash lures. The campaign, tracked as KongTuke, uses a malicious Chrome extension named 'NexShield – Advanced Web Guardian' to crash the browser and trick victims into executing commands. The extension masquerades as a legitimate ad blocker and claims to protect users against ads, trackers, malware, and intrusive content. The extension was downloaded at least 5,000 times and is a near-identical clone of uBlock Origin Lite. The extension displays a fake security warning claiming the browser had 'stopped abnormally' and prompts users to run a 'scan'. The scan presents a bogus security alert instructing victims to open the Windows Run dialog and execute a command copied to the clipboard. Executing the command causes the browser to freeze and crash by launching a denial-of-service (DoS) attack that creates new runtime port connections through an infinite loop. The extension transmits a unique ID to an attacker-controlled server, allowing operators to track victims. The extension uses a delayed execution mechanism, triggering malicious behavior 60 minutes after installation and then every 10 minutes. The extension incorporates anti-analysis techniques to disable right-click context menus and prevent the use of developer tools. The CrashFix command employs the legitimate Windows utility, finger.exe, to retrieve and execute the next-stage payload from the attacker's server. The payload is a PowerShell command that retrieves a secondary PowerShell script, which uses multiple layers of Base64 encoding and XOR operations to conceal the next-stage malware. The decrypted blob scans running processes for over 50 analysis tools and virtual machine indicators, ceasing execution if found. The script checks if the machine is domain-joined or standalone and sends an HTTP POST request to the server containing a list of installed antivirus products and a flag indicating the machine type. For domain-joined machines, the campaign deploys ModeloRAT, a fully-featured Python-based Windows RAT that uses RC4 encryption for C2 communications. ModeloRAT sets up persistence using Registry and facilitates the execution of binaries, DLLs, Python scripts, and PowerShell commands. ModeloRAT is equipped to update or terminate itself upon receiving specific commands and implements varied beaconing logic to avoid detection. For standalone workstations, the campaign ends with the C2 server responding with a test payload message, indicating it may still be in the testing phase. KongTuke's CrashFix campaign demonstrates how threat actors evolve their social engineering tactics by impersonating trusted projects and exploiting user frustration. Huntress attributes the analyzed CrashFix attack to a threat actor named 'KongTuke', whose operations have been on the company's radar since early 2025. Based on the recent discovery, the researchers believe that KongTuke is evolving and becoming more interested in enterprise networks, which are more lucrative for cybercriminals. Falling for ClickFix attacks can be prevented by making sure that the effect of any external command executed on the system is well understood. Furthermore, installing browser extensions from trusted publishers or sources should keep you safe from CrashFix attacks or other threats. Users who installed NexShield should perform a full system cleanup, as uninstalling the extension does not remove all payloads, such as ModeloRAT or other malicious scripts. The new campaign abuses SyncAppvPublishingServer.vbs, a signed Visual Basic Script associated with App-V, to retrieve and execute an in-memory loader from an external server using wscript.exe. The campaign uses a fake CAPTCHA verification prompt to trick users into pasting and executing a malicious command on the Windows Run dialog. The obfuscated loader runs checks to ensure that it's not run within sandboxed environments. The loader fetches configuration data from a public Google Calendar (ICS) file, turning a trusted third-party service into a dead drop resolver. The campaign retrieves additional loader stages, including a PowerShell script that functions as an intermediate loader to execute the next stage directly in memory. The resulting script is decrypted, GZip decompressed in memory, and run using Invoke-Expression, ultimately culminating in the execution of a shellcode loader designed to launch Amatera Stealer. The campaign targets enterprise managed systems, as the virtualization solution is built only into Enterprise and Education editions of Windows 10 and Windows 11, along with modern Windows Server versions. The campaign is highly sophisticated and evasive, using in-memory PowerShell code execution and relying on blockchain and popular CDNs to avoid communicating with any infrastructure that's not a legitimate service. The campaign uses a multi-stage attack chain that includes a fake CAPTCHA verification prompt, abuse of SyncAppvPublishingServer.vbs, and retrieval of configuration data from a public Google Calendar file. The campaign is part of the broader fake CAPTCHA ecosystem, which uses trusted web infrastructure as the delivery surface, with Cloudflare-style challenges acting as a conduit for clipboard-driven execution of PowerShell commands, VB Scripts, MSI installers, and browser-native frameworks like Matrix Push C2. **New Development:** Microsoft has disclosed a DNS-based ClickFix variant that uses the `nslookup` command to stage payloads via DNS queries, retrieving a second-stage payload from a hard-coded DNS server. This attack chain downloads a ZIP archive from `azwsappdev[.]com`, extracts a Python script for reconnaissance, and deploys **ModeloRAT** via a VBScript, with persistence established through an LNK file in the Windows Startup folder. Concurrently, Bitdefender reports a surge in **Lumma Stealer** activity driven by ClickFix-style campaigns deploying **CastleLoader**, an AutoIt-based loader that evades detection by checking for virtualization and security tools. Lumma Stealer infections are geolocated primarily in India, France, and the U.S. The article also details macOS-focused ClickFix campaigns delivering **Odyssey Stealer** (a Poseidon Stealer rebrand) and **ClearFake** campaigns leveraging EtherHiding via BNB Smart Chain to fetch payloads. The evolution of ClickFix now includes DNS-based staging, expanded loader integration, and cross-platform targeting, demonstrating resilience despite 2025 law enforcement disruptions.
Show sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
Information Snippets
-
UNC5518 uses ClickFix to deploy the CORNFLAKE.V3 backdoor via fake CAPTCHA pages and malicious PowerShell scripts.
First reported: 21.08.2025 19:253 sources, 9 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The initial infection vector involves tricking users into executing a PowerShell script via the Windows Run dialog.
First reported: 21.08.2025 19:253 sources, 12 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
UNC5774 and UNC4108 leverage the access provided by UNC5518 to deploy additional payloads.
First reported: 21.08.2025 19:253 sources, 7 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
CORNFLAKE.V3 supports the execution of various payload types, including executables, DLLs, JavaScript files, batch scripts, and PowerShell commands.
First reported: 21.08.2025 19:253 sources, 7 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
CORNFLAKE.V3 collects system information and transmits it via Cloudflare tunnels to evade detection.
First reported: 21.08.2025 19:253 sources, 7 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
CORNFLAKE.V3 features host persistence via a registry Run key and supports additional payload types compared to its predecessor, CORNFLAKE.V2.
First reported: 21.08.2025 19:253 sources, 7 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
WINDYTWIST.SEA, a C version of WINDYTWIST, supports lateral movement within infected networks.
First reported: 21.08.2025 19:253 sources, 7 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix attack is a new variant of the ClickFix family of attacks.
First reported: 16.09.2025 15:003 sources, 7 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
FileFix uses the address bar in File Explorer to execute malicious commands.
First reported: 16.09.2025 15:003 sources, 7 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix technique was created by red team researcher mr.d0x.
First reported: 16.09.2025 15:003 sources, 8 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The new FileFix campaign impersonates Meta account suspension warnings.
First reported: 16.09.2025 15:003 sources, 8 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix campaign uses a multi-language phishing page to trick users.
First reported: 16.09.2025 15:003 sources, 8 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The campaign disguises a PowerShell command as a file path to install malware.
First reported: 16.09.2025 15:003 sources, 8 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix campaign uses steganography to hide a second-stage PowerShell script and encrypted executables inside a JPG image.
First reported: 16.09.2025 15:003 sources, 8 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The final payload in the FileFix campaign is the StealC infostealer malware.
First reported: 16.09.2025 15:004 sources, 9 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
StealC targets credentials from web browsers, messaging apps, cryptocurrency wallets, cloud credentials, VPN and gaming apps, and can take screenshots of the active desktop.
First reported: 16.09.2025 15:004 sources, 9 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix campaign has evolved over two weeks with different payloads, domains, and lures.
First reported: 16.09.2025 15:003 sources, 8 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix campaign demonstrates an attacker testing and adapting their infrastructure.
First reported: 16.09.2025 15:003 sources, 8 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix campaign has been observed in multiple countries, including the US, Philippines, Bangladesh, Tunisia, Dominican Republic, Germany, China, Peru, Nepal, and Serbia.
First reported: 16.09.2025 15:003 sources, 7 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The phishing site used in the FileFix campaign has been translated into at least 16 different languages, indicating a global targeting strategy.
First reported: 16.09.2025 15:003 sources, 7 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix technique was conceived by a red team researcher known as mr. d0x in mid-2022.
First reported: 16.09.2025 15:003 sources, 7 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix campaign uses AI-generated images to conceal malicious payloads.
First reported: 16.09.2025 15:003 sources, 7 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix campaign is considered the most mature and sophisticated to date, combining convincing phishing, tough code obfuscation, and robust steganography.
First reported: 16.09.2025 15:003 sources, 7 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix campaign has a broader range of high-value targets compared to ClickFix due to its use of File Explorer.
First reported: 16.09.2025 15:003 sources, 7 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix campaign is expected to see more attacks in the near future due to its effectiveness and novelty.
First reported: 16.09.2025 15:003 sources, 7 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix attack uses a multilingual phishing site to trick users into executing a malicious command via the File Explorer address bar.
First reported: 16.09.2025 15:332 sources, 6 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix attack leverages Bitbucket to host the malicious components, abusing a legitimate source code hosting platform to bypass detection.
First reported: 16.09.2025 15:332 sources, 6 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix attack involves a multi-stage PowerShell script that downloads an image, decodes it into the next-stage payload, and runs a Go-based loader to launch StealC.
First reported: 16.09.2025 15:332 sources, 6 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix attack uses advanced obfuscation techniques, including junk code and fragmentation, to hinder analysis efforts.
First reported: 16.09.2025 15:332 sources, 6 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix attack is more likely to be detected by security products due to the payload being executed by the web browser used by the victim.
First reported: 16.09.2025 15:332 sources, 6 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix attack demonstrates significant investment in tradecraft, with carefully engineered phishing infrastructure, payload delivery, and supporting elements to maximize evasion and impact.
First reported: 16.09.2025 15:332 sources, 6 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix attack is more sophisticated than ClickFix, as it abuses a widely used browser feature instead of the Run dialog or Terminal app.
First reported: 16.09.2025 15:332 sources, 6 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix attack has been observed in a campaign that uses a combination of fake support portals, Cloudflare CAPTCHA error pages, and clipboard hijacking to socially engineer victims into running malicious PowerShell code.
First reported: 16.09.2025 15:332 sources, 6 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix attack has been observed using an AutoHotkey (AHK) script to profile the compromised host and deliver additional payloads, including AnyDesk, TeamViewer, information stealers, and clipper malware.
First reported: 16.09.2025 15:332 sources, 5 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The FileFix attack has been observed using an MSHTA command pointing to a lookalike Google domain to retrieve and execute a remote malicious script.
First reported: 16.09.2025 15:332 sources, 5 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The MetaStealer malware is a commodity infostealer known for harvesting credentials and stealing files.
First reported: 17.09.2025 17:012 sources, 5 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The MetaStealer attack involves a fake Cloudflare Turnstile lure, the Windows search protocol, and an MSI package disguised as a PDF.
First reported: 17.09.2025 17:012 sources, 5 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The MetaStealer attack uses a Windows shortcut LNK file disguised as a PDF file to execute malicious commands.
First reported: 17.09.2025 17:012 sources, 5 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The MetaStealer attack involves a DLL sideloading technique using a legitimate SentinelOne executable.
First reported: 17.09.2025 17:012 sources, 5 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The MetaStealer attack uses a custom search query as part of the search-ms URI protocol to redirect victims to an attacker-controlled SMB share.
First reported: 17.09.2025 17:012 sources, 5 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The MetaStealer attack involves an MSI package containing a DLL and a CAB archive with additional malicious files.
First reported: 17.09.2025 17:012 sources, 5 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The MetaStealer attack uses a large binary protected with Private EXE Protector to evade detection.
First reported: 17.09.2025 17:012 sources, 5 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The MetaStealer attack targets crypto wallets and other sensitive information.
First reported: 17.09.2025 17:012 sources, 5 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The MetaStealer attack involves a multi-stage infection chain that includes a fake PDF lure to grab the victim's hostname.
First reported: 17.09.2025 17:012 sources, 5 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The MetaStealer attack uses a combination of social engineering and technical evasion techniques to deploy malware.
First reported: 17.09.2025 17:012 sources, 5 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
ClickFix attacks now feature videos that guide victims through the self-infection process.
First reported: 06.11.2025 16:002 sources, 9 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
A timer is used to pressure victims into taking risky actions.
First reported: 06.11.2025 16:002 sources, 8 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The attacks automatically detect the operating system to provide the correct commands.
First reported: 06.11.2025 16:002 sources, 8 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Push Security researchers have observed these changes in recent ClickFix campaigns.
First reported: 06.11.2025 16:002 sources, 6 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The fake Cloudflare CAPTCHA verification challenge includes a one-minute countdown timer.
First reported: 06.11.2025 16:002 sources, 9 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
The attacks are primarily promoted through malvertizing on Google Search.
First reported: 06.11.2025 16:002 sources, 10 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
Threat actors exploit known flaws on outdated WordPress plugins to compromise legitimate sites.
First reported: 06.11.2025 16:002 sources, 8 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Threat actors use SEO poisoning tactics to rank malicious sites higher in search results.
First reported: 06.11.2025 16:002 sources, 8 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Payloads delivered in these attacks include MSHTA executable, PowerShell scripts, and living-off-the-land binaries.
First reported: 06.11.2025 16:002 sources, 10 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
Future ClickFix attacks could run entirely in the browser, evading EDR protections.
First reported: 06.11.2025 16:002 sources, 7 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Threat actors are abusing the decades-old Finger protocol to retrieve and execute remote commands on Windows devices.
First reported: 15.11.2025 20:462 sources, 7 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The Finger protocol is used to deliver commands that create a random-named path, download a zip archive disguised as a PDF, and extract a Python malware package.
First reported: 15.11.2025 20:462 sources, 7 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The Python program is executed using pythonw.exe __init__.py, and a callback is made to the attacker's server to confirm execution.
First reported: 15.11.2025 20:462 sources, 7 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
A related batch file indicates that the Python package is an infostealer.
First reported: 15.11.2025 20:462 sources, 7 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Another campaign uses the Finger protocol to retrieve and run commands that look for malware research tools and exit if found.
First reported: 15.11.2025 20:462 sources, 7 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
If no malware analysis tools are found, the commands download a zip archive disguised as PDF files and extract the NetSupport Manager RAT package.
First reported: 15.11.2025 20:462 sources, 7 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The commands configure a scheduled task to launch the remote access malware when the user logs in.
First reported: 15.11.2025 20:462 sources, 7 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The Finger protocol abuse appears to be carried out by a single threat actor conducting ClickFix attacks.
First reported: 15.11.2025 20:462 sources, 7 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Amatera Stealer is an evolution of ACR Stealer, available under a malware-as-a-service (MaaS) model with subscription plans ranging from $199 per month to $1,499 per year.
First reported: 17.11.2025 18:532 sources, 6 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Amatera Stealer targets crypto-wallets, browsers, messaging applications, FTP clients, and email services, employing advanced evasion techniques such as WoW64 SysCalls.
First reported: 17.11.2025 18:532 sources, 6 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Amatera Stealer is packed using PureCrypter, a C#-based multi-functional crypter and loader advertised as a MaaS offering by a threat actor named PureCoder.
First reported: 17.11.2025 18:532 sources, 6 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Amatera Stealer is injected into the MSBuild.exe process to harvest sensitive data and contact an external server to execute a PowerShell command to fetch and run NetSupport RAT.
First reported: 17.11.2025 18:532 sources, 6 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Amatera Stealer checks if the victim machine is part of a domain or has files of potential value, such as crypto wallets, before downloading NetSupport RAT.
First reported: 17.11.2025 18:532 sources, 6 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Recent phishing campaigns have propagated a wide range of malware families, including XWorm, NetSupport RAT, credential stealers, and phishing kits named Cephas and Tycoon 2FA.
First reported: 17.11.2025 18:532 sources, 7 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Tycoon 2FA is a phishing kit that bypasses multi-factor authentication (MFA) and authentication apps by intercepting usernames, passwords, session cookies, and MFA flows in real-time.
First reported: 18.11.2025 17:012 sources, 7 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Tycoon 2FA has been used in over 64,000 attacks this year, primarily targeting Microsoft 365 and Gmail.
First reported: 18.11.2025 17:012 sources, 7 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Tycoon 2FA includes anti-detection layers such as Base64 encoding, LZ string compression, DOM vanishing, CryptoJS obfuscation, automated bot filtering, CAPTCHA challenges, and debugger checks.
First reported: 18.11.2025 17:012 sources, 7 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Tycoon 2FA can lead to total session takeover, allowing attackers to move laterally into SharePoint, OneDrive, email, Teams, HR systems, and finance systems.
First reported: 18.11.2025 17:012 sources, 7 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Legacy MFA methods like SMS codes, push notifications, and TOTP apps are vulnerable to Tycoon 2FA due to their reliance on user behavior.
First reported: 18.11.2025 17:012 sources, 7 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Criminal groups such as Scattered Spider, Octo Tempest, and Storm 1167 are using Tycoon 2FA daily.
First reported: 18.11.2025 17:012 sources, 7 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Phishing-proof MFA solutions, such as Token Ring and Token BioStick, use biometric authentication, proximity-based checks, and domain binding to prevent phishing attacks.
First reported: 18.11.2025 17:012 sources, 7 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Token Ring and Token BioStick solutions are inexpensive, available today, and provide a better user experience with faster authentication times.
First reported: 18.11.2025 17:012 sources, 7 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Tycoon 2FA is a turnkey kit that removes the need for technical skill, making it accessible to anyone with a browser.
First reported: 18.11.2025 17:012 sources, 6 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Tycoon 2FA provides fake login pages and spins up reverse proxy servers, automating the phishing process.
First reported: 18.11.2025 17:012 sources, 7 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Tycoon 2FA intercepts usernames, passwords, session cookies, and MFA flows in real-time, allowing attackers to bypass MFA.
First reported: 18.11.2025 17:012 sources, 7 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Tycoon 2FA includes anti-detection layers such as Base64 encoding, LZ string compression, DOM vanishing, CryptoJS obfuscation, automated bot filtering, CAPTCHA challenges, and debugger checks.
First reported: 18.11.2025 17:012 sources, 7 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Tycoon 2FA can lead to total session takeover, allowing attackers to move laterally into SharePoint, OneDrive, email, Teams, HR systems, and finance systems.
First reported: 18.11.2025 17:012 sources, 7 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Legacy MFA methods like SMS codes, push notifications, and TOTP apps are vulnerable to Tycoon 2FA due to their reliance on user behavior.
First reported: 18.11.2025 17:012 sources, 7 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Criminal groups such as Scattered Spider, Octo Tempest, and Storm 1167 are using Tycoon 2FA daily.
First reported: 18.11.2025 17:012 sources, 7 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Phishing-proof MFA solutions, such as Token Ring and Token BioStick, use biometric authentication, proximity-based checks, and domain binding to prevent phishing attacks.
First reported: 18.11.2025 17:012 sources, 7 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Token Ring and Token BioStick solutions are inexpensive, available today, and provide a better user experience with faster authentication times.
First reported: 18.11.2025 17:012 sources, 7 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
A new operation embedding StealC V2 inside Blender project files has been observed targeting victims for at least six months.
First reported: 24.11.2025 16:003 sources, 7 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The attackers placed manipulated .blend files on platforms such as CGTrader, where users downloaded them as routine 3D assets.
First reported: 24.11.2025 16:003 sources, 7 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
When opened with Blender’s Auto Run feature enabled, the files executed concealed Python scripts that launched a multistage infection.
First reported: 24.11.2025 16:003 sources, 7 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The infection chain began with a tampered Rig_Ui.py script embedded inside the .blend file.
First reported: 24.11.2025 16:003 sources, 7 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
This script fetched a loader from a remote workers.dev domain, which then downloaded a PowerShell stage and two ZIP archives containing Python-based stealers.
First reported: 24.11.2025 16:003 sources, 7 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Once extracted into the Windows temp directory, the malware created LNK files to secure persistence, then used Pyramid C2 channels to retrieve encrypted payloads.
First reported: 24.11.2025 16:003 sources, 7 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
StealC V2, promoted on underground forums since April 2025, has rapidly expanded its feature set.
First reported: 24.11.2025 16:003 sources, 7 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
It now targets more than 23 browsers, over 100 plugins, more than 15 desktop wallets, and a range of messaging, VPN and mail clients.
First reported: 24.11.2025 16:003 sources, 7 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Its pricing, from $200 per month to $800 for 6 months, has made it accessible to low-tier cybercriminals seeking ready-to-use tools.
First reported: 24.11.2025 16:003 sources, 7 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Several indicators of compromise (IoCs) surfaced during the investigation, including malicious .blend files hosted on CGTrader, payload retrieval through multiple workers.dev domains, ZIP archives containing Python stealers and persistence components, and command-and-control (C2) communication across several Pyramid-linked IPs.
First reported: 24.11.2025 16:003 sources, 6 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
ClickFix attack variants have been observed using a realistic-looking Windows Update animation in a full-screen browser page to trick users into executing malicious commands.
First reported: 24.11.2025 22:422 sources, 6 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The new ClickFix variants drop the LummaC2 and Rhadamanthys information stealers.
First reported: 24.11.2025 22:422 sources, 6 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The attack uses steganography to encode the final malware payload inside an image.
First reported: 24.11.2025 22:422 sources, 6 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The process involves multiple stages that use PowerShell code and a .NET assembly (the Stego Loader) responsible for reconstructing the final payload embedded inside a PNG file in an encrypted state.
First reported: 24.11.2025 22:422 sources, 6 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The shellcode holding the infostealer samples is packed using the Donut tool.
First reported: 24.11.2025 22:422 sources, 6 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The Rhadamanthys variant that used the Windows Update lure was first spotted by researchers back in October, before Operation Endgame took down parts of its infrastructure on November 13.
First reported: 24.11.2025 22:422 sources, 6 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The StealC V2 malware used in this campaign was the latest variant of the second major version of the malware.
First reported: 25.11.2025 00:002 sources, 6 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The StealC malware supports exfiltration from 23+ browsers, with server-side credential decryption and compatibility with Chrome 132+.
First reported: 25.11.2025 00:002 sources, 6 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The StealC malware supports exfiltration from 100+ cryptocurrency wallet browser extensions and 15+ cryptocurrency wallet apps.
First reported: 25.11.2025 00:002 sources, 6 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The StealC malware supports exfiltration from Telegram, Discord, Tox, Pidgin, VPN clients (ProtonVPN, OpenVPN), and mail clients (Thunderbird).
First reported: 25.11.2025 00:002 sources, 6 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The StealC malware has an updated UAC bypass mechanism.
First reported: 25.11.2025 00:002 sources, 6 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The malware loader is fetched from a Cloudflare Workers domain.
First reported: 25.11.2025 00:002 sources, 6 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The PowerShell script retrieves two ZIP archives, ZalypaGyliveraV1 and BLENDERX, from attacker-controlled IPs.
First reported: 25.11.2025 00:002 sources, 6 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The archives unpack into the %TEMP% folder and drop LNK files in the Startup directory for persistence.
First reported: 25.11.2025 00:002 sources, 6 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The campaign deploys two payloads: the StealC infostealer and an auxiliary Python stealer, likely used for redundancy.
First reported: 25.11.2025 00:002 sources, 6 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
No security engine on VirusTotal detected the StealC variant analyzed by Morphisec.
First reported: 25.11.2025 00:002 sources, 6 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The campaign has been active for at least six months, involving the implantation of malicious .blend files on platforms like CGTrader.
First reported: 25.11.2025 13:282 sources, 5 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The attack chains involve uploading malicious .blend files to free 3D asset sites such as CGTrader containing a malicious "Rig_Ui.py" script.
First reported: 25.11.2025 13:282 sources, 5 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The malicious "Rig_Ui.py" script is executed as soon as the .blend files are opened with Blender's Auto Run feature enabled.
First reported: 25.11.2025 13:282 sources, 5 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The Rig_Ui.py script fetches a PowerShell script to download two ZIP archives.
First reported: 25.11.2025 13:282 sources, 5 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
One of the ZIP files contains a payload for StealC V2, while the second archive deploys a secondary Python-based stealer on the compromised host.
First reported: 25.11.2025 13:282 sources, 5 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The updated version of StealC, first announced in late April 2025, supports a wide range of information gathering features, allowing data to be extracted from 23 browsers, 100 web plugins and extensions, 15 cryptocurrency wallet apps, messaging services, VPNs, and email clients.
First reported: 25.11.2025 13:282 sources, 5 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The campaign shares similarities with a prior campaign linked to Russian-speaking threat actors that involved impersonating the Electronic Frontier Foundation (EFF) to target the online gaming community and infect them with StealC and Pyramid C2.
First reported: 25.11.2025 13:282 sources, 5 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The assessment is based on tactical similarities in both campaigns, including using decoy documents, evasive techniques, and background execution of malware.
First reported: 25.11.2025 13:282 sources, 5 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Blender's documentation acknowledges the security risk posed by the ability to include Python scripts within blend-files, which can execute arbitrary Python scripts.
First reported: 25.11.2025 13:282 sources, 5 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
A new campaign codenamed JackFix leverages fake adult websites (xHamster, PornHub clones) as its phishing mechanism, likely distributed via malvertising.
First reported: 25.11.2025 16:182 sources, 4 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The JackFix campaign displays highly convincing fake Windows update screens in an attempt to get the victim to run malicious code.
First reported: 25.11.2025 16:182 sources, 4 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The attack heavily leans on obfuscation to conceal ClickFix-related code and blocks users from escaping the full-screen alert by disabling the Escape and F11 buttons, along with F5 and F12 keys.
First reported: 25.11.2025 16:182 sources, 4 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The initial command executed is an MSHTA payload that's launched using the legitimate mshta.exe binary, which contains JavaScript designed to run a PowerShell command to retrieve another PowerShell script from a remote server.
First reported: 25.11.2025 16:182 sources, 4 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The PowerShell script attempts to elevate privileges and creates Microsoft Defender Antivirus exclusions for command-and-control (C2) addresses and paths where the payloads are staged.
First reported: 25.11.2025 16:182 sources, 4 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The PowerShell script serves up to eight different payloads, including Rhadamanthys Stealer, Vidar Stealer 2.0, RedLine Stealer, Amadey, and other unspecified loaders and RATs.
First reported: 25.11.2025 16:182 sources, 4 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The threat actor often changes the URI used to host the first mshta.exe stage and has been observed moving from hosting the second stage on the domain securitysettings.live to xoiiasdpsdoasdpojas.com, although both point to the same IP address 141.98.80.175.
First reported: 25.11.2025 16:182 sources, 4 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Storm-0249 abuses endpoint detection and response (EDR) solutions and trusted Microsoft Windows utilities to load malware, establish communication, and persistence in preparation for ransomware attacks.
First reported: 09.12.2025 17:242 sources, 3 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Storm-0249 has moved beyond mass phishing and adopted stealthier, more advanced methods that prove effective and difficult for defenders to counter.
First reported: 09.12.2025 17:242 sources, 3 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Storm-0249 leveraged the SentinelOne EDR components to hide malicious activity, but the same method works with other EDR products.
First reported: 09.12.2025 17:242 sources, 3 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The attack started with ClickFix social engineering that tricked users into pasting and executing curl commands in the Windows Run dialog to download a malicious MSI package with SYSTEM privileges.
First reported: 09.12.2025 17:242 sources, 3 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
A malicious PowerShell script is fetched from a spoofed Microsoft domain, which is piped straight onto the system's memory, never touching the disk and thus evading antivirus detection.
First reported: 09.12.2025 17:242 sources, 3 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The MSI file drops a malicious DLL (SentinelAgentCore.dll), which is placed strategically alongside the pre-existing, legitimate SentinelAgentWorker.exe, which is already installed as part of the victim's SentinelOne EDR.
First reported: 09.12.2025 17:242 sources, 3 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The attacker loads the DLL using the signed SentinelAgentWorker (DLL sideloading), executing the file within the trusted, privileged EDR process and obtaining stealthy persistence that survives operating system updates.
First reported: 09.12.2025 17:242 sources, 3 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The legitimate process runs the attacker's code, appearing as routine SentinelOne activity to security tools and bypassing detection.
First reported: 09.12.2025 17:242 sources, 3 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Once the attacker gains access, they use the SentinelOne component to collect system identifiers through legitimate Windows utilities like reg.exe and findstr.exe, and to funnel encrypted HTTPS command-and-control (C2) traffic.
First reported: 09.12.2025 17:242 sources, 3 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Registry queries and string searches conducted from within a trusted EDR process are treated as routine and ignored by security mechanisms.
First reported: 09.12.2025 17:242 sources, 3 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The compromised systems are profiled using 'MachineGuid,' a unique hardware-based identifier that ransomware groups like LockBit and ALPHV use for binding encryption keys to specific victims.
First reported: 09.12.2025 17:242 sources, 3 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The abuse of trusted, signed EDR processes bypasses nearly all traditional monitoring.
First reported: 09.12.2025 17:242 sources, 3 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
System administrators are recommended to rely on behavior-based detection that identifies trusted processes loading unsigned DLLs from non-standard paths.
First reported: 09.12.2025 17:242 sources, 3 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
It is helpful to set stricter controls for curl, PowerShell, and LoLBin execution.
First reported: 09.12.2025 17:242 sources, 3 articlesShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
ConsentFix is a new variant of the ClickFix attack that abuses the Azure CLI OAuth app to hijack Microsoft accounts without requiring a password or bypassing MFA verifications.
First reported: 11.12.2025 17:102 sources, 3 articlesShow sources
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
ConsentFix tricks victims into completing the Azure CLI OAuth flow and steals the resulting authorization code, which is exchanged for full account access.
First reported: 11.12.2025 17:102 sources, 3 articlesShow sources
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The attack starts with victims landing on a compromised, legitimate website that ranks high on Google Search results.
First reported: 11.12.2025 17:102 sources, 3 articlesShow sources
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Victims are shown a fake Cloudflare Turnstile CAPTCHA widget that asks for a valid business email address, filtering out bots and non-targets.
First reported: 11.12.2025 17:102 sources, 3 articlesShow sources
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Victims are instructed to click a 'Sign in' button that opens a legitimate Microsoft URL in a new tab, leading to an Azure login page.
First reported: 11.12.2025 17:102 sources, 3 articlesShow sources
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The attack completes when victims paste the URL containing the Azure CLI OAuth authorization code into the malicious page, granting attackers access to the Microsoft account via Azure CLI.
First reported: 11.12.2025 17:102 sources, 3 articlesShow sources
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The attack triggers only once per victim IP address, preventing repeated phishing attempts on the same IP.
First reported: 11.12.2025 17:102 sources, 3 articlesShow sources
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Defenders are advised to monitor for unusual Azure CLI login activity, such as logins from new IP addresses, and to check for legacy Graph scopes used by attackers to evade detection.
First reported: 11.12.2025 17:102 sources, 3 articlesShow sources
- New ConsentFix attack hijacks Microsoft accounts via Azure CLI — www.bleepingcomputer.com — 11.12.2025 17:10
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The BitB phishing technique was developed by security researcher mr.d0x in 2022.
First reported: 12.01.2026 23:053 sources, 3 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Threat actors steal Facebook accounts to spread scams, harvest personal data, or commit identity fraud.
First reported: 12.01.2026 23:053 sources, 3 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
In a BitB attack, users who visit attacker-controlled webpages are presented with a fake browser pop-up containing a login form.
First reported: 12.01.2026 23:053 sources, 3 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The pop-up is implemented using an iframe that imitates the authentication interface of legitimate platforms and can be customized with a window title and URL that make the deception more difficult to detect.
First reported: 12.01.2026 23:053 sources, 3 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Recent phishing campaigns targeting Facebook users impersonate law firms claiming copyright infringement, threatening imminent account suspension, or Meta security notifications about unauthorized logins.
First reported: 12.01.2026 23:053 sources, 3 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
To avoid detection and to increase the sense of legitimacy, cybercriminals added shortened URLs and fake Meta CAPTCHA pages.
First reported: 12.01.2026 23:053 sources, 3 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
In the final stage of the attack, victims are prompted to log in by entering their Facebook credentials in a fake pop-up window.
First reported: 12.01.2026 23:053 sources, 3 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Trellix discovered a high number of phishing pages hosted on legitimate cloud platforms like Netlify and Vercel, which mimic Meta's Privacy Center portal, redirecting users to pages disguised as appeal forms that collected personal information.
First reported: 12.01.2026 23:053 sources, 3 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
These campaigns constitute a significant evolution compared to standard Facebook phishing campaigns that security researchers typically observe.
First reported: 12.01.2026 23:053 sources, 3 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The key shift lies in the abuse of trusted infrastructure, utilizing legitimate cloud hosting services like Netlify and Vercel, and URL shorteners to bypass traditional security filters and lend a false sense of security to phishing pages.
First reported: 12.01.2026 23:053 sources, 3 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Most critically, the emergence of the Browser-in-the-Browser (BitB) technique represents a major escalation. By creating a custom-built, fake login pop-up window within the victim's browser, this method capitalizes on user familiarity with authentication flows, making credential theft nearly impossible to detect visually.
First reported: 12.01.2026 23:053 sources, 3 articlesShow sources
- Facebook login thieves now using browser-in-browser trick — www.bleepingcomputer.com — 12.01.2026 23:05
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Cybercriminals are increasingly using the browser-in-the-browser (BitB) attack technique to steal Facebook login credentials.
First reported: 13.01.2026 16:402 sources, 2 articlesShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Phishing emails lure users with messages claiming copyright infringement, unauthorized login attempts, or account shutdown due to suspicious activity.
First reported: 13.01.2026 16:402 sources, 2 articlesShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Attackers use shortened URLs to make phishing links appear more legitimate.
First reported: 13.01.2026 16:402 sources, 2 articlesShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The BitB attack involves a fake browser pop-up window that mimics the real Facebook login page, including the real Facebook login page URL hardcoded into the authentication window.
First reported: 13.01.2026 16:402 sources, 2 articlesShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Attackers deploy a fake CAPTCHA window before the login page to increase the appearance of legitimacy.
First reported: 13.01.2026 16:402 sources, 2 articlesShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Phishing pages ask for personal information such as name, email address, phone number, and date of birth before requesting password confirmation.
First reported: 13.01.2026 16:402 sources, 2 articlesShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The attacks aim to steal sensitive personal information, usernames, and passwords for further fraud.
First reported: 13.01.2026 16:402 sources, 2 articlesShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Trellix recommends applying two-factor authentication (2FA) to block account takeovers even if credentials are stolen.
First reported: 13.01.2026 16:402 sources, 2 articlesShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Users are advised to treat unexpected requests with suspicion and log in directly via Facebook's official website instead of following unfamiliar links.
First reported: 13.01.2026 16:402 sources, 2 articlesShow sources
- Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords — www.infosecurity-magazine.com — 13.01.2026 16:40
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
StealC malware operators used a web-based control panel vulnerable to cross-site scripting (XSS) attacks.
First reported: 19.01.2026 08:531 source, 2 articlesShow sources
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Researchers exploited the XSS vulnerability to gather system fingerprints, monitor active sessions, and steal cookies from the StealC control panel.
First reported: 19.01.2026 08:531 source, 2 articlesShow sources
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
StealC malware has been distributed via YouTube as part of a campaign known as the YouTube Ghost Network.
First reported: 19.01.2026 08:531 source, 2 articlesShow sources
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
StealC malware has been updated to include Telegram bot integration for notifications, enhanced payload delivery, and a redesigned panel, codenamed StealC V2.
First reported: 19.01.2026 08:531 source, 2 articlesShow sources
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The source code for the StealC administration panel was leaked, providing insights into the threat actor's operations.
First reported: 19.01.2026 08:531 source, 2 articlesShow sources
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
A StealC customer named YouTubeTA used Google's video-sharing platform to distribute the stealer by advertising cracked versions of Adobe Photoshop and Adobe After Effects.
First reported: 19.01.2026 08:531 source, 2 articlesShow sources
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
YouTubeTA amassed over 5,000 logs containing 390,000 stolen passwords and more than 30 million stolen cookies.
First reported: 19.01.2026 08:531 source, 2 articlesShow sources
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
YouTubeTA is suspected of seizing control of legitimate YouTube accounts to promote cracked software.
First reported: 19.01.2026 08:531 source, 2 articlesShow sources
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
YouTubeTA used ClickFix-like fake CAPTCHA lures to distribute StealC, indicating a broader infection method beyond YouTube.
First reported: 19.01.2026 08:531 source, 2 articlesShow sources
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The StealC panel allows operators to create multiple users and differentiate between admin users and regular users.
First reported: 19.01.2026 08:531 source, 2 articlesShow sources
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
YouTubeTA operated from an Eastern European country where Russian is commonly spoken, using an Apple M3 processor-based machine.
First reported: 19.01.2026 08:531 source, 2 articlesShow sources
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
An operational security blunder revealed YouTubeTA's real IP address, associated with a Ukrainian provider called TRK Cable TV.
First reported: 19.01.2026 08:531 source, 2 articlesShow sources
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The StealC developers exhibited weaknesses in cookie security and panel code quality, allowing researchers to gather data about their customers.
First reported: 19.01.2026 08:531 source, 2 articlesShow sources
- Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations — thehackernews.com — 19.01.2026 08:53
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
A new campaign codenamed CrashFix uses a malicious Chrome extension to deliver ModeloRAT via ClickFix-style browser crash lures.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The campaign, tracked as KongTuke, uses a malicious Chrome extension named 'NexShield – Advanced Web Guardian' to crash the browser and trick victims into executing commands.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The extension masquerades as a legitimate ad blocker and claims to protect users against ads, trackers, malware, and intrusive content.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The extension was downloaded at least 5,000 times and is a near-identical clone of uBlock Origin Lite.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The extension displays a fake security warning claiming the browser had 'stopped abnormally' and prompts users to run a 'scan'.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The scan presents a bogus security alert instructing victims to open the Windows Run dialog and execute a command copied to the clipboard.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Executing the command causes the browser to freeze and crash by launching a denial-of-service (DoS) attack that creates new runtime port connections through an infinite loop.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The extension transmits a unique ID to an attacker-controlled server, allowing operators to track victims.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The extension uses a delayed execution mechanism, triggering malicious behavior 60 minutes after installation and then every 10 minutes.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The extension incorporates anti-analysis techniques to disable right-click context menus and prevent the use of developer tools.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The CrashFix command employs the legitimate Windows utility, finger.exe, to retrieve and execute the next-stage payload from the attacker's server.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The payload is a PowerShell command that retrieves a secondary PowerShell script, which uses multiple layers of Base64 encoding and XOR operations to conceal the next-stage malware.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The decrypted blob scans running processes for over 50 analysis tools and virtual machine indicators, ceasing execution if found.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The script checks if the machine is domain-joined or standalone and sends an HTTP POST request to the server containing a list of installed antivirus products and a flag indicating the machine type.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
For domain-joined machines, the campaign deploys ModeloRAT, a fully-featured Python-based Windows RAT that uses RC4 encryption for C2 communications.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
ModeloRAT sets up persistence using Registry and facilitates the execution of binaries, DLLs, Python scripts, and PowerShell commands.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
ModeloRAT is equipped to update or terminate itself upon receiving specific commands and implements varied beaconing logic to avoid detection.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
For standalone workstations, the campaign ends with the C2 server responding with a test payload message, indicating it may still be in the testing phase.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
KongTuke's CrashFix campaign demonstrates how threat actors evolve their social engineering tactics by impersonating trusted projects and exploiting user frustration.
First reported: 19.01.2026 11:092 sources, 3 articlesShow sources
- CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures — thehackernews.com — 19.01.2026 11:09
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The NexShield extension creates a denial-of-service (DoS) condition in the browser by creating 'chrome.runtime' port connections in an infinite loop and exhausting its memory resources.
First reported: 20.01.2026 00:492 sources, 2 articlesShow sources
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The NexShield extension displays a deceptive pop-up that shows a fake warning and suggests scanning the system to locate the problem.
First reported: 20.01.2026 00:492 sources, 2 articlesShow sources
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The 'fixing' command is a chain that triggers an obfuscated PowerShell script via a remote connection, which downloads and executes a malicious script.
First reported: 20.01.2026 00:492 sources, 2 articlesShow sources
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The payload has a 60-minute execution delay after installing NexShield to dissociate the extension from the malicious activity and evade detection.
First reported: 20.01.2026 00:492 sources, 2 articlesShow sources
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
For domain-joined hosts specific to corporate environments, the threat actor delivers ModeloRAT, which can perform system reconnaissance, execute PowerShell commands, modify the Registry, introduce additional payloads, and update itself.
First reported: 20.01.2026 00:492 sources, 2 articlesShow sources
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
For non-domain hosts, which are normally home users, the command and control server returned a "TEST PAYLOAD!!!!" message, indicating either low priority or work in progress.
First reported: 20.01.2026 00:492 sources, 2 articlesShow sources
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The researchers provide a proper technical report on the entire CrashFix attack and the payloads delivered this way. They detail the multiple stages of the infection chain and ModeloRAT's capabilities, from establishing persistence and collecting reconnaissance info to executing commands, fingerprinting systems, and determining its privileges on the compromised system.
First reported: 20.01.2026 00:492 sources, 2 articlesShow sources
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Huntress attributes the analyzed CrashFix attack to a threat actor named 'KongTuke', whose operations have been on the company's radar since early 2025.
First reported: 20.01.2026 00:492 sources, 2 articlesShow sources
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Based on the recent discovery, the researchers believe that KongTuke is evolving and becoming more interested in enterprise networks, which are more lucrative for cybercriminals.
First reported: 20.01.2026 00:492 sources, 2 articlesShow sources
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Falling for ClickFix attacks can be prevented by making sure that the effect of any external command executed on the system is well understood. Furthermore, installing browser extensions from trusted publishers or sources should keep you safe from CrashFix attacks or other threats.
First reported: 20.01.2026 00:492 sources, 2 articlesShow sources
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
Users who installed NexShield should perform a full system cleanup, as uninstalling the extension does not remove all payloads, such as ModeloRAT or other malicious scripts.
First reported: 20.01.2026 00:492 sources, 2 articlesShow sources
- Fake ad blocker extension crashes the browser for ClickFix attacks — www.bleepingcomputer.com — 20.01.2026 00:49
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The new campaign abuses SyncAppvPublishingServer.vbs, a signed Visual Basic Script associated with App-V, to retrieve and execute an in-memory loader from an external server using wscript.exe.
First reported: 27.01.2026 16:381 source, 1 articleShow sources
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The campaign uses a fake CAPTCHA verification prompt to trick users into pasting and executing a malicious command on the Windows Run dialog.
First reported: 27.01.2026 16:381 source, 1 articleShow sources
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The obfuscated loader runs checks to ensure that it's not run within sandboxed environments.
First reported: 27.01.2026 16:381 source, 1 articleShow sources
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The loader fetches configuration data from a public Google Calendar (ICS) file, turning a trusted third-party service into a dead drop resolver.
First reported: 27.01.2026 16:381 source, 1 articleShow sources
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The campaign retrieves additional loader stages, including a PowerShell script that functions as an intermediate loader to execute the next stage directly in memory.
First reported: 27.01.2026 16:381 source, 1 articleShow sources
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The resulting script is decrypted, GZip decompressed in memory, and run using Invoke-Expression, ultimately culminating in the execution of a shellcode loader designed to launch Amatera Stealer.
First reported: 27.01.2026 16:381 source, 1 articleShow sources
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The campaign targets enterprise managed systems, as the virtualization solution is built only into Enterprise and Education editions of Windows 10 and Windows 11, along with modern Windows Server versions.
First reported: 27.01.2026 16:381 source, 1 articleShow sources
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The campaign is highly sophisticated and evasive, using in-memory PowerShell code execution and relying on blockchain and popular CDNs to avoid communicating with any infrastructure that's not a legitimate service.
First reported: 27.01.2026 16:381 source, 1 articleShow sources
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The campaign uses a multi-stage attack chain that includes a fake CAPTCHA verification prompt, abuse of SyncAppvPublishingServer.vbs, and retrieval of configuration data from a public Google Calendar file.
First reported: 27.01.2026 16:381 source, 1 articleShow sources
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The campaign is part of the broader fake CAPTCHA ecosystem, which uses trusted web infrastructure as the delivery surface, with Cloudflare-style challenges acting as a conduit for clipboard-driven execution of PowerShell commands, VB Scripts, MSI installers, and browser-native frameworks like Matrix Push C2.
First reported: 27.01.2026 16:381 source, 1 articleShow sources
- ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services — thehackernews.com — 27.01.2026 16:38
-
The new DNS-based ClickFix variant uses the `nslookup` command to execute a custom DNS lookup via the Windows Run dialog, retrieving the next-stage payload from a hard-coded external DNS server rather than the system's default resolver.
First reported: 15.02.2026 16:101 source, 1 articleShow sources
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
The DNS response containing the `Name:` field is extracted and executed as the second-stage payload, using DNS as a lightweight staging or signaling channel to blend malicious activity into normal network traffic.
First reported: 15.02.2026 16:101 source, 1 articleShow sources
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
The attack chain downloads a ZIP archive from the domain `azwsappdev[.]com`, extracts a malicious Python script, and executes it to conduct reconnaissance, run discovery commands, and drop a VBScript that launches ModeloRAT.
First reported: 15.02.2026 16:101 source, 1 articleShow sources
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
Persistence is established by creating an LNK file in the Windows Startup folder, pointing to the VBScript to automatically launch ModeloRAT on system startup.
First reported: 15.02.2026 16:101 source, 1 articleShow sources
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
Bitdefender reports a surge in Lumma Stealer activity driven by ClickFix-style fake CAPTCHA campaigns deploying an AutoIt version of CastleLoader, which checks for virtualization and security software before decrypting and launching Lumma Stealer in memory.
First reported: 15.02.2026 16:101 source, 1 articleShow sources
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
CastleLoader campaigns also distribute fake NSIS installers and rogue VBA scripts to deploy Lumma Stealer, using scheduled tasks for persistence.
First reported: 15.02.2026 16:101 source, 1 articleShow sources
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
One CastleLoader domain (`testdomain123123[.]shop`) was identified as a Lumma Stealer C2, suggesting collaboration or shared infrastructure between the two malware families.
First reported: 15.02.2026 16:101 source, 1 articleShow sources
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
Lumma Stealer infections are predominantly observed in India, followed by France, the U.S., Spain, Germany, Brazil, Mexico, Romania, Italy, and Canada.
First reported: 15.02.2026 16:101 source, 1 articleShow sources
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
A macOS ClickFix campaign delivers Odyssey Stealer (a rebrand of Poseidon Stealer) via phishing and malvertising, targeting 203 browser wallet extensions and 18 desktop wallets for cryptocurrency theft.
First reported: 15.02.2026 16:101 source, 1 articleShow sources
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
Odyssey Stealer functions as a full remote access trojan (RAT), using a persistent LaunchDaemon to poll the C2 every 60 seconds for commands, supporting shell execution, reinfection, and SOCKS5 proxy tunneling.
First reported: 15.02.2026 16:101 source, 1 articleShow sources
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
A Windows ClickFix campaign uses fake CAPTCHA pages on compromised legitimate sites to deploy StealC via PowerShell commands.
First reported: 15.02.2026 16:101 source, 1 articleShow sources
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
A macOS email phishing campaign deploys an AppleScript file under the guise of compatibility fixes, stealing credentials and retrieving additional JavaScript payloads by forging TCC authorizations for trusted Apple binaries.
First reported: 15.02.2026 16:101 source, 1 articleShow sources
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
A ClearFake campaign uses fake CAPTCHA lures on compromised WordPress sites to execute an HTA file and deploy Lumma Stealer, also leveraging EtherHiding via BNB Smart Chain contracts to fetch payloads from GitHub.
First reported: 15.02.2026 16:101 source, 1 articleShow sources
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
EtherHiding blends malicious traffic with legitimate Web3 activity, using blockchain immutability to resist takedowns.
First reported: 15.02.2026 16:101 source, 1 articleShow sources
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
Flare reports that macOS infostealers prioritize cryptocurrency theft, exploiting the misconception that 'Macs don’t get viruses' and targeting Keychain, browser storage, and irreversible crypto transactions.
First reported: 15.02.2026 16:101 source, 1 articleShow sources
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging — thehackernews.com — 15.02.2026 16:10
-
A new malware campaign abuses over 4,000 malicious Google Groups and 3,500 Google-hosted URLs to distribute Lumma Stealer and a trojanized Chromium-based browser named 'Ninja Browser'.
First reported: 15.02.2026 18:301 source, 1 articleShow sources
- CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups — www.bleepingcomputer.com — 15.02.2026 18:30
-
The campaign embeds organization names and industry-relevant keywords in Google Groups posts to increase credibility and drive downloads of malicious payloads.
First reported: 15.02.2026 18:301 source, 1 articleShow sources
- CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups — www.bleepingcomputer.com — 15.02.2026 18:30
-
Attackers use URL shorteners or Google-hosted redirectors via Docs and Drive to evade detection and deliver OS-specific payloads.
First reported: 15.02.2026 18:301 source, 1 articleShow sources
- CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups — www.bleepingcomputer.com — 15.02.2026 18:30
-
For Windows targets, the campaign delivers a 950MB password-protected archive padded with null bytes to evade antivirus file-size scanning thresholds.
First reported: 15.02.2026 18:301 source, 1 articleShow sources
- CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups — www.bleepingcomputer.com — 15.02.2026 18:30
-
The Windows payload reassembles segmented binary files, launches an AutoIt-compiled executable, and decrypts a memory-resident Lumma Stealer payload.
First reported: 15.02.2026 18:301 source, 1 articleShow sources
- CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups — www.bleepingcomputer.com — 15.02.2026 18:30
-
Lumma Stealer exfiltrates browser credentials, harvests session cookies, executes shell commands, and sends data via HTTP POST requests to C2 infrastructure (e.g., healgeni[.]live).
First reported: 15.02.2026 18:301 source, 1 articleShow sources
- CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups — www.bleepingcomputer.com — 15.02.2026 18:30
-
Linux users are redirected to download 'Ninja Browser,' a trojanized Chromium-based browser that silently installs malicious extensions without user consent.
First reported: 15.02.2026 18:301 source, 1 articleShow sources
- CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups — www.bleepingcomputer.com — 15.02.2026 18:30
-
The 'NinjaBrowserMonetisation' extension tracks users via unique identifiers, injects scripts, manipulates cookies, and loads remote content using obfuscated JavaScript (XOR and Base56-like encoding).
First reported: 15.02.2026 18:301 source, 1 articleShow sources
- CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups — www.bleepingcomputer.com — 15.02.2026 18:30
-
The trojanized browser defaults to a Russian-based search engine ('X-Finder') and implements scheduled tasks to poll attacker-controlled servers daily for silent updates.
First reported: 15.02.2026 18:301 source, 1 articleShow sources
- CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups — www.bleepingcomputer.com — 15.02.2026 18:30
-
The campaign is linked to infrastructure including IPs 152.42.139[.]18 and 89.111.170[.]100, and domains such as ninja-browser[.]com, nb-download[.]com, and nbdownload[.]space.
First reported: 15.02.2026 18:301 source, 1 articleShow sources
- CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups — www.bleepingcomputer.com — 15.02.2026 18:30
-
CTM360 attributes the activity to a broader trend of attackers weaponizing trusted SaaS platforms (e.g., Google Groups, Docs, Drive) to evade detection and bypass trust-based filtering.
First reported: 15.02.2026 18:301 source, 1 articleShow sources
- CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups — www.bleepingcomputer.com — 15.02.2026 18:30
Similar Happenings
Trojanized 7-Zip installer distributes proxy malware
A fake 7-Zip website distributes a malicious installer that turns infected computers into residential proxy nodes. The campaign uses a trojanized version of the 7-Zip tool, which includes legitimate functionality but also installs proxy malware. The malware communicates with command-and-control (C2) servers using obfuscated messages and avoids detection by checking for virtualization and debuggers. The threat actor registered the domain 7zip[.]com, mimicking the legitimate 7-Zip website. The malware modifies firewall rules to allow inbound and outbound connections and collects system information, which is sent to a remote server. The campaign also involves trojanized installers for other popular applications like HolaVPN, TikTok, WhatsApp, and Wire VPN.
341 Malicious ClawHub Skills Target OpenClaw Users with Atomic Stealer
A security audit by Koi Security identified 341 malicious skills on ClawHub, a marketplace for OpenClaw users, which distribute Atomic Stealer malware to steal sensitive data from macOS and Windows systems. The campaign, codenamed ClawHavoc, uses social engineering tactics to trick users into installing malicious prerequisites. The skills masquerade as legitimate tools, including cryptocurrency utilities, YouTube tools, and finance applications. OpenClaw has added a reporting feature and partnered with VirusTotal to scan skills uploaded to ClawHub, providing an additional layer of security for the OpenClaw community. The malware targets API keys, credentials, and other sensitive data, exploiting the open-source ecosystem's vulnerabilities. The campaign coincides with a report from OpenSourceMalware, highlighting the same threat. The intersection of AI agent capabilities and persistent memory amplifies the risks, enabling stateful, delayed-execution attacks. New findings reveal almost 400 fake crypto trading add-ons in the project behind the viral Moltbot/OpenClaw AI assistant tool can lead users to install information-stealing malware. These addons, called skills, masquerade as cryptocurrency trading automation tools and target ByBit, Polymarket, Axiom, Reddit, and LinkedIn. The malicious skills share the same command-and-control (C2) infrastructure, 91.92.242.30, and use sophisticated social engineering to convince users to execute malicious commands which then steals crypto assets like exchange API keys, wallet private keys, SSH credentials, and browser passwords.
Android Malware Campaign Abuses Hugging Face Platform
A new Android malware campaign leverages the Hugging Face platform to distribute thousands of variants of an APK payload designed to steal credentials from popular financial and payment services. The attack begins with a dropper app called TrustBastion, which uses scareware-style ads to lure victims into installing it. The malware then redirects to a Hugging Face repository to download the final payload, using server-side polymorphism to evade detection. The malware exploits Android’s Accessibility Services to capture screenshots, monitor user activity, and steal credentials. The campaign was discovered by Bitdefender researchers, who found over 6,000 commits in the repository. The repository was taken down but resurfaced under a new name, 'Premium Club,' with the same malicious code. Bitdefender has published indicators of compromise and informed Hugging Face, which removed the malicious datasets. The infection chain begins when users download the malicious Android app TrustBastion, which appears as scareware via popups claiming the device is infected with malware. The dropper app prompts users to run an update that mimics legitimate Google Play and Android system update dialog boxes. The dropper contacts an encrypted endpoint hosted at trustbastion[.]com, which returns an HTML file containing a redirect link to the Hugging Face repository hosting the malware. The malware masquerades as a 'Phone Security' feature to guide users through enabling Accessibility Services. The malware requests permissions for screen recording, screen casting, and overlay display to monitor all user activity and capture screen content. The malware captures lockscreen information for security verification of financial and payment services.
Malicious OpenClaw AI Coding Assistant Extension on VS Code Marketplace
A malicious Microsoft Visual Studio Code (VS Code) extension named "ClawdBot Agent - AI Coding Assistant" was discovered on the official Extension Marketplace. The extension, which posed as a free AI coding assistant, stealthily dropped a malicious payload on compromised hosts. The extension was taken down by Microsoft after being reported by cybersecurity researchers. The malicious extension executed a binary named "Code.exe" that deployed a legitimate remote desktop program, granting attackers persistent remote access to compromised hosts. The extension also incorporated multiple fallback mechanisms to ensure payload delivery, including retrieving a DLL from Dropbox and using hard-coded URLs to obtain the payloads. Additionally, security researchers found hundreds of unauthenticated Moltbot instances online, exposing sensitive data and credentials. Moltbot, an open-source personal AI assistant, can run 24/7 locally, maintaining a persistent memory and executing scheduled tasks. However, insecure deployments can lead to sensitive data leaks, corporate data exposure, credential theft, and command execution. Hundreds of Clawdbot Control admin interfaces are exposed online due to reverse proxy misconfiguration, allowing unauthenticated access and root-level system access. More than 230 malicious packages for OpenClaw (formerly Moltbot and ClawdBot) have been published in less than a week on the tool's official registry and on GitHub. These malicious skills impersonate legitimate utilities and inject information-stealing malware payloads onto users' systems, targeting sensitive data like API keys, wallet private keys, SSH credentials, and browser passwords. Users are advised to audit their configurations, revoke connected service integrations, and implement network controls to mitigate potential risks. A self-styled social networking platform built for AI agents, Moltbook, contained a misconfigured database that allowed full read and write access to all data. The exposure was due to a Supabase API key exposed in client-side JavaScript, granting unauthenticated access to the entire production database. Researchers accessed 1.5 million API authentication tokens, 30,000 email addresses, and thousands of private messages between agents. The API key exposure allowed attackers to impersonate any agent on the platform, post content, send messages, and interact as that agent. Unauthenticated users could edit existing posts, inject malicious content or prompt injection payloads, and deface the site. SecurityScorecard found 40,214 exposed OpenClaw instances associated with 28,663 unique IP addresses. 63% of observed deployments are vulnerable, with 12,812 instances exploitable via remote code execution (RCE) attacks. SecurityScorecard correlated 549 instances with prior breach activity and 1493 with known vulnerabilities. Three high-severity CVEs in OpenClaw have been discovered, with public exploit code available. OpenClaw instances are at risk of indirect prompt injection and API key leaks, with most exposures located in China, the US, and Singapore.
Multi-Stage AitM Phishing and BEC Campaigns Target Energy Sector
Microsoft has identified a multi-stage adversary-in-the-middle (AitM) phishing and business email compromise (BEC) campaign targeting organizations in the energy sector. The attackers abused SharePoint file-sharing services to deliver phishing payloads and created inbox rules to maintain persistence and evade detection. The campaign involved leveraging compromised internal identities to conduct large-scale phishing attacks within and outside the victim organizations. Additionally, the AgreeTo Outlook add-in was hijacked and turned into a phishing kit, stealing over 4,000 Microsoft account credentials. The threat actor deployed a fake Microsoft sign-in page, password collection page, exfiltration script, and redirect, exploiting the add-in's ReadWriteItem permissions. This is the first known instance of malware found on the official Microsoft Marketplace. The add-in was abandoned by its developer and the attacker exploited the abandoned domain to serve the phishing kit. The incident highlights the need for better monitoring of add-ins and their associated URLs.