UNC5518 Access-as-a-Service Campaign via ClickFix and Fake CAPTCHA Pages
Summary
Hide ▲
Show ▼
The ClickFix malware campaign has evolved to include multi-OS support and video tutorials that guide victims through the self-infection process. The campaign, which uses fake Cloudflare CAPTCHA pages and malicious PowerShell scripts, has been observed deploying various payloads, including information stealers and backdoors. The FileFix attack, a variant of the ClickFix family, impersonates Meta account suspension warnings to trick users into installing the StealC infostealer malware. The campaign has evolved over two weeks with different payloads, domains, and lures, indicating an attacker testing and adapting their infrastructure. The FileFix technique, created by red team researcher mr. d0x, uses the address bar in File Explorer to execute malicious commands. The campaign employs steganography to hide a second-stage PowerShell script and encrypted executables inside a JPG image, which is believed to be AI-generated. The StealC malware targets credentials from various applications, cryptocurrency wallets, and cloud services, and can take screenshots of the active desktop. The FileFix attack uses a multilingual phishing site to trick users into executing a malicious command via the File Explorer address bar. The attack leverages Bitbucket to host the malicious components, abusing a legitimate source code hosting platform to bypass detection. The attack involves a multi-stage PowerShell script that downloads an image, decodes it into the next-stage payload, and runs a Go-based loader to launch StealC. The attack uses advanced obfuscation techniques, including junk code and fragmentation, to hinder analysis efforts. The FileFix attack is more likely to be detected by security products due to the payload being executed by the web browser used by the victim. The FileFix attack demonstrates significant investment in tradecraft, with carefully engineered phishing infrastructure, payload delivery, and supporting elements to maximize evasion and impact. The MetaStealer attack, a variant of the ClickFix family, uses a fake Cloudflare Turnstile lure and an MSI package disguised as a PDF to deploy the MetaStealer infostealer malware. The attack involves a multi-stage infection chain that includes a DLL sideloading technique using a legitimate SentinelOne executable. The MetaStealer attack targets crypto wallets and other sensitive information, using a combination of social engineering and technical evasion techniques to deploy malware. Recently, threat actors have been abusing the decades-old Finger protocol to retrieve and execute remote commands on Windows devices. The Finger protocol is used to deliver commands that create a random-named path, download a zip archive disguised as a PDF, and extract a Python malware package. The Python program is executed using pythonw.exe __init__.py, and a callback is made to the attacker's server to confirm execution. A related batch file indicates that the Python package is an infostealer. Another campaign uses the Finger protocol to retrieve and run commands that look for malware research tools and exit if found. If no malware analysis tools are found, the commands download a zip archive disguised as PDF files and extract the NetSupport Manager RAT package. The commands configure a scheduled task to launch the remote access malware when the user logs in. The Finger protocol abuse appears to be carried out by a single threat actor conducting ClickFix attacks. A new EVALUSION ClickFix campaign has been discovered, delivering Amatera Stealer and NetSupport RAT. Amatera Stealer, an evolution of ACR Stealer, is available under a malware-as-a-service (MaaS) model and targets crypto-wallets, browsers, messaging applications, FTP clients, and email services. It employs advanced evasion techniques such as WoW64 SysCalls and is packed using PureCrypter. The stealer is injected into the MSBuild.exe process to harvest sensitive data and contact an external server to execute a PowerShell command to fetch and run NetSupport RAT. The campaign also involves phishing attacks using various malware families and phishing kits named Cephas and Tycoon 2FA. Tycoon 2FA is a phishing kit that bypasses multi-factor authentication (MFA) and authentication apps by intercepting usernames, passwords, session cookies, and MFA flows in real-time. It has been used in over 64,000 attacks this year, primarily targeting Microsoft 365 and Gmail. Tycoon 2FA includes anti-detection layers and can lead to total session takeover, allowing attackers to move laterally into various enterprise systems. Legacy MFA methods are vulnerable to Tycoon 2FA, and phishing-proof MFA solutions like Token Ring and Token BioStick are recommended to prevent such attacks. A new operation embedding StealC V2 inside Blender project files has been observed targeting victims for at least six months. The attackers placed manipulated .blend files on platforms such as CGTrader, where users downloaded them as routine 3D assets. When opened with Blender’s Auto Run feature enabled, the files executed concealed Python scripts that launched a multistage infection. The infection chain began with a tampered Rig_Ui.py script embedded inside the .blend file. This script fetched a loader from a remote workers.dev domain, which then downloaded a PowerShell stage and two ZIP archives containing Python-based stealers. Once extracted into the Windows temp directory, the malware created LNK files to secure persistence, then used Pyramid C2 channels to retrieve encrypted payloads. StealC V2, promoted on underground forums since April 2025, has rapidly expanded its feature set. It now targets more than 23 browsers, over 100 plugins, more than 15 desktop wallets, and a range of messaging, VPN and mail clients. Its pricing, from $200 per month to $800 for 6 months, has made it accessible to low-tier cybercriminals seeking ready-to-use tools. ClickFix attack variants have been observed using a realistic-looking Windows Update animation in a full-screen browser page to trick users into executing malicious commands. The new ClickFix variants drop the LummaC2 and Rhadamanthys information stealers. The attack uses steganography to encode the final malware payload inside an image. The process involves multiple stages that use PowerShell code and a .NET assembly (the Stego Loader) responsible for reconstructing the final payload embedded inside a PNG file in an encrypted state. The shellcode holding the infostealer samples is packed using the Donut tool. The Rhadamanthys variant that used the Windows Update lure was first spotted by researchers back in October, before Operation Endgame took down parts of its infrastructure on November 13. A new campaign codenamed JackFix leverages fake adult websites (xHamster, PornHub clones) as its phishing mechanism, likely distributed via malvertising. The JackFix campaign displays highly convincing fake Windows update screens in an attempt to get the victim to run malicious code. The attack heavily leans on obfuscation to conceal ClickFix-related code and blocks users from escaping the full-screen alert by disabling the Escape and F11 buttons, along with F5 and F12 keys. The initial command executed is an MSHTA payload that's launched using the legitimate mshta.exe binary, which contains JavaScript designed to run a PowerShell command to retrieve another PowerShell script from a remote server. The PowerShell script attempts to elevate privileges and creates Microsoft Defender Antivirus exclusions for command-and-control (C2) addresses and paths where the payloads are staged. The PowerShell script serves up to eight different payloads, including Rhadamanthys Stealer, Vidar Stealer 2.0, RedLine Stealer, Amadey, and other unspecified loaders and RATs. The threat actor often changes the URI used to host the first mshta.exe stage and has been observed moving from hosting the second stage on the domain securitysettings.live to xoiiasdpsdoasdpojas.com, although both point to the same IP address 141.98.80.175. An initial access broker tracked as Storm-0249 is abusing endpoint detection and response solutions and trusted Microsoft Windows utilities to load malware, establish communication, and persistence in preparation for ransomware attacks. The threat actor has moved beyond mass phishing and adopted stealthier, more advanced methods that prove effective and difficult for defenders to counter. In one attack analyzed by researchers at cybersecurity company ReliaQuest, Storm-0249 leveraged the SentinelOne EDR components to hide malicious activity. The attack started with ClickFix social engineering that tricked users into pasting and executing curl commands in the Windows Run dialog to download a malicious MSI package with SYSTEM privileges. A malicious PowerShell script is also fetched from a spoofed Microsoft domain, which is piped straight onto the system's memory, never touching the disk and thus evading antivirus detection. The MSI file drops a malicious DLL (SentinelAgentCore.dll), which is placed strategically alongside the pre-existing, legitimate SentinelAgentWorker.exe, which is already installed as part of the victim's SentinelOne EDR. Next, the attacker loads the DLL using the signed SentinelAgentWorker (DLL sideloading), executing the file within the trusted, privileged EDR process and obtaining stealthy persistence that survives operating system updates. Once the attacker gains access, they use the SentinelOne component to collect system identifiers through legitimate Windows utilities like reg.exe and findstr.exe, and to funnel encrypted HTTPS command-and-control (C2) traffic. The compromised systems are profiled using 'MachineGuid,' a unique hardware-based identifier that ransomware groups like LockBit and ALPHV use for binding encryption keys to specific victims. The abuse of trusted, signed EDR processes bypasses nearly all traditional monitoring. The researchers recommend that system administrators rely on behavior-based detection that identifies trusted processes loading unsigned DLLs from non-standard paths. Furthermore, it is helpful to set stricter controls for curl, PowerShell, and LoLBin execution.
Timeline
-
17.11.2025 18:53 3 articles · 22d ago
EVALUSION ClickFix campaign delivers Amatera Stealer and NetSupport RAT
A new EVALUSION ClickFix campaign has been discovered, delivering Amatera Stealer and NetSupport RAT. Amatera Stealer, an evolution of ACR Stealer, is available under a malware-as-a-service (MaaS) model and targets crypto-wallets, browsers, messaging applications, FTP clients, and email services. It employs advanced evasion techniques such as WoW64 SysCalls and is packed using PureCrypter. The stealer is injected into the MSBuild.exe process to harvest sensitive data and contact an external server to execute a PowerShell command to fetch and run NetSupport RAT. The campaign also involves phishing attacks using various malware families and phishing kits named Cephas and Tycoon 2FA. Tycoon 2FA is a phishing kit that bypasses multi-factor authentication (MFA) and authentication apps by intercepting usernames, passwords, session cookies, and MFA flows in real-time. It has been used in over 64,000 attacks this year, primarily targeting Microsoft 365 and Gmail. The kit includes anti-detection layers and can lead to total session takeover, allowing attackers to move laterally into various enterprise systems. Legacy MFA methods like SMS codes, push notifications, and TOTP apps are vulnerable to Tycoon 2FA due to their reliance on user behavior. Criminal groups such as Scattered Spider, Octo Tempest, and Storm 1167 are using Tycoon 2FA daily. Phishing-proof MFA solutions, such as Token Ring and Token BioStick, use biometric authentication, proximity-based checks, and domain binding to prevent phishing attacks. Token Ring and Token BioStick solutions are inexpensive, available today, and provide a better user experience with faster authentication times.
Show sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
-
17.09.2025 17:01 2 articles · 2mo ago
MetaStealer attack uses fake Cloudflare Turnstile and MSI package
The MetaStealer attack, a variant of the ClickFix family, uses a fake Cloudflare Turnstile lure and an MSI package disguised as a PDF to deploy the MetaStealer infostealer malware. The attack involves a multi-stage infection chain that includes a DLL sideloading technique using a legitimate SentinelOne executable. The MetaStealer attack targets crypto wallets and other sensitive information, using a combination of social engineering and technical evasion techniques to deploy malware.
Show sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
-
16.09.2025 15:00 8 articles · 2mo ago
FileFix attack impersonates Meta and deploys StealC infostealer
A Russian-linked campaign delivers the StealC V2 information stealer malware through malicious Blender files uploaded to 3D model marketplaces like CGTrader. The campaign exploits Blender's Auto Run feature to execute embedded Python scripts that fetch a malware loader from a Cloudflare Workers domain. The loader then retrieves a PowerShell script that downloads two ZIP archives, which unpack into the %TEMP% folder and drop LNK files in the Startup directory for persistence. The campaign deploys two payloads: the StealC infostealer and an auxiliary Python stealer. The StealC malware used in this campaign is the latest variant of the second major version, with expanded data-stealing capabilities and support for exfiltration from various browsers, cryptocurrency wallets, messaging apps, VPN clients, and mail clients. Despite being documented since 2023, the malware remains elusive to anti-virus products, with no security engine on VirusTotal detecting the analyzed variant. The campaign has been active for at least six months, involving the implantation of malicious .blend files on platforms like CGTrader. The attack chains involve uploading malicious .blend files containing a malicious "Rig_Ui.py" script, which is executed as soon as the files are opened with Blender's Auto Run feature enabled. The Rig_Ui.py script fetches a PowerShell script to download two ZIP archives, one of which contains a payload for StealC V2, while the second archive deploys a secondary Python-based stealer on the compromised host. The updated version of StealC supports a wide range of information gathering features, allowing data to be extracted from various browsers, web plugins, cryptocurrency wallet apps, messaging services, VPNs, and email clients. The campaign shares similarities with a prior campaign linked to Russian-speaking threat actors, involving impersonating the Electronic Frontier Foundation (EFF) to target the online gaming community and infect them with StealC and Pyramid C2. Blender's documentation acknowledges the security risk posed by the ability to include Python scripts within blend-files, which can execute arbitrary Python scripts.
Show sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
-
21.08.2025 19:25 8 articles · 3mo ago
UNC5518 Access-as-a-Service Campaign via ClickFix and Fake CAPTCHA Pages
The ClickFix attacks now feature videos that guide victims through the self-infection process, a timer to pressure targets into taking risky actions, and automatic detection of the operating system to provide the correct commands. The attacks are primarily promoted through malvertizing on Google Search and exploit known flaws on outdated WordPress plugins to compromise legitimate sites. The payloads delivered in these attacks include MSHTA executable, PowerShell scripts, and living-off-the-land binaries. Additionally, threat actors have been abusing the decades-old Finger protocol to retrieve and execute remote commands on Windows devices. The Finger protocol is used to deliver commands that create a random-named path, download a zip archive disguised as a PDF, and extract a Python malware package. The Python program is executed using pythonw.exe __init__.py, and a callback is made to the attacker's server to confirm execution. A related batch file indicates that the Python package is an infostealer. Another campaign uses the Finger protocol to retrieve and run commands that look for malware research tools and exit if found. If no malware analysis tools are found, the commands download a zip archive disguised as PDF files and extract the NetSupport Manager RAT package. The commands configure a scheduled task to launch the remote access malware when the user logs in. The Finger protocol abuse appears to be carried out by a single threat actor conducting ClickFix attacks. A new EVALUSION ClickFix campaign has been discovered, delivering Amatera Stealer and NetSupport RAT. Amatera Stealer, an evolution of ACR Stealer, is available under a malware-as-a-service (MaaS) model and targets crypto-wallets, browsers, messaging applications, FTP clients, and email services. It employs advanced evasion techniques such as WoW64 SysCalls and is packed using PureCrypter. The stealer is injected into the MSBuild.exe process to harvest sensitive data and contact an external server to execute a PowerShell command to fetch and run NetSupport RAT. ClickFix attack variants have been observed using a realistic-looking Windows Update animation in a full-screen browser page to trick users into executing malicious commands. The new ClickFix variants drop the LummaC2 and Rhadamanthys information stealers. The attack uses steganography to encode the final malware payload inside an image. The process involves multiple stages that use PowerShell code and a .NET assembly (the Stego Loader) responsible for reconstructing the final payload embedded inside a PNG file in an encrypted state. The shellcode holding the infostealer samples is packed using the Donut tool. The Rhadamanthys variant that used the Windows Update lure was first spotted by researchers back in October, before Operation Endgame took down parts of its infrastructure on November 13. A new campaign codenamed JackFix leverages fake adult websites (xHamster, PornHub clones) as its phishing mechanism, likely distributed via malvertising. The JackFix campaign displays highly convincing fake Windows update screens in an attempt to get the victim to run malicious code. The attack heavily leans on obfuscation to conceal ClickFix-related code and blocks users from escaping the full-screen alert by disabling the Escape and F11 buttons, along with F5 and F12 keys. The initial command executed is an MSHTA payload that's launched using the legitimate mshta.exe binary, which contains JavaScript designed to run a PowerShell command to retrieve another PowerShell script from a remote server. The PowerShell script attempts to elevate privileges and creates Microsoft Defender Antivirus exclusions for command-and-control (C2) addresses and paths where the payloads are staged. The PowerShell script serves up to eight different payloads, including Rhadamanthys Stealer, Vidar Stealer 2.0, RedLine Stealer, Amadey, and other unspecified loaders and RATs. The threat actor often changes the URI used to host the first mshta.exe stage and has been observed moving from hosting the second stage on the domain securitysettings.live to xoiiasdpsdoasdpojas.com, although both point to the same IP address 141.98.80.175. An initial access broker tracked as Storm-0249 is abusing endpoint detection and response solutions and trusted Microsoft Windows utilities to load malware, establish communication, and persistence in preparation for ransomware attacks. The threat actor has moved beyond mass phishing and adopted stealthier, more advanced methods that prove effective and difficult for defenders to counter. In one attack analyzed by researchers at cybersecurity company ReliaQuest, Storm-0249 leveraged the SentinelOne EDR components to hide malicious activity. The attack started with ClickFix social engineering that tricked users into pasting and executing curl commands in the Windows Run dialog to download a malicious MSI package with SYSTEM privileges. A malicious PowerShell script is also fetched from a spoofed Microsoft domain, which is piped straight onto the system's memory, never touching the disk and thus evading antivirus detection. The MSI file drops a malicious DLL (SentinelAgentCore.dll), which is placed strategically alongside the pre-existing, legitimate SentinelAgentWorker.exe, which is already installed as part of the victim's SentinelOne EDR. Next, the attacker loads the DLL using the signed SentinelAgentWorker (DLL sideloading), executing the file within the trusted, privileged EDR process and obtaining stealthy persistence that survives operating system updates. Once the attacker gains access, they use the SentinelOne component to collect system identifiers through legitimate Windows utilities like reg.exe and findstr.exe, and to funnel encrypted HTTPS command-and-control (C2) traffic. The compromised systems are profiled using 'MachineGuid,' a unique hardware-based identifier that ransomware groups like LockBit and ALPHV use for binding encryption keys to specific victims. The abuse of trusted, signed EDR processes bypasses nearly all traditional monitoring. The researchers recommend that system administrators rely on behavior-based detection that identifies trusted processes loading unsigned DLLs from non-standard paths. Furthermore, it is helpful to set stricter controls for curl, PowerShell, and LoLBin execution.
Show sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
Information Snippets
-
UNC5518 uses ClickFix to deploy the CORNFLAKE.V3 backdoor via fake CAPTCHA pages and malicious PowerShell scripts.
First reported: 21.08.2025 19:253 sources, 8 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The initial infection vector involves tricking users into executing a PowerShell script via the Windows Run dialog.
First reported: 21.08.2025 19:253 sources, 8 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
UNC5774 and UNC4108 leverage the access provided by UNC5518 to deploy additional payloads.
First reported: 21.08.2025 19:253 sources, 6 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
CORNFLAKE.V3 supports the execution of various payload types, including executables, DLLs, JavaScript files, batch scripts, and PowerShell commands.
First reported: 21.08.2025 19:253 sources, 6 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
CORNFLAKE.V3 collects system information and transmits it via Cloudflare tunnels to evade detection.
First reported: 21.08.2025 19:253 sources, 6 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
CORNFLAKE.V3 features host persistence via a registry Run key and supports additional payload types compared to its predecessor, CORNFLAKE.V2.
First reported: 21.08.2025 19:253 sources, 6 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
WINDYTWIST.SEA, a C version of WINDYTWIST, supports lateral movement within infected networks.
First reported: 21.08.2025 19:253 sources, 6 articlesShow sources
- Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages — thehackernews.com — 21.08.2025 19:25
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix attack is a new variant of the ClickFix family of attacks.
First reported: 16.09.2025 15:003 sources, 6 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
FileFix uses the address bar in File Explorer to execute malicious commands.
First reported: 16.09.2025 15:003 sources, 5 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix technique was created by red team researcher mr.d0x.
First reported: 16.09.2025 15:003 sources, 6 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The new FileFix campaign impersonates Meta account suspension warnings.
First reported: 16.09.2025 15:003 sources, 6 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix campaign uses a multi-language phishing page to trick users.
First reported: 16.09.2025 15:003 sources, 6 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The campaign disguises a PowerShell command as a file path to install malware.
First reported: 16.09.2025 15:003 sources, 6 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix campaign uses steganography to hide a second-stage PowerShell script and encrypted executables inside a JPG image.
First reported: 16.09.2025 15:003 sources, 6 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The final payload in the FileFix campaign is the StealC infostealer malware.
First reported: 16.09.2025 15:004 sources, 7 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
StealC targets credentials from web browsers, messaging apps, cryptocurrency wallets, cloud credentials, VPN and gaming apps, and can take screenshots of the active desktop.
First reported: 16.09.2025 15:004 sources, 7 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix campaign has evolved over two weeks with different payloads, domains, and lures.
First reported: 16.09.2025 15:003 sources, 6 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix campaign demonstrates an attacker testing and adapting their infrastructure.
First reported: 16.09.2025 15:003 sources, 6 articlesShow sources
- New FileFix attack uses steganography to drop StealC malware — www.bleepingcomputer.com — 16.09.2025 15:00
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix campaign has been observed in multiple countries, including the US, Philippines, Bangladesh, Tunisia, Dominican Republic, Germany, China, Peru, Nepal, and Serbia.
First reported: 16.09.2025 15:003 sources, 5 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The phishing site used in the FileFix campaign has been translated into at least 16 different languages, indicating a global targeting strategy.
First reported: 16.09.2025 15:003 sources, 5 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix technique was conceived by a red team researcher known as mr. d0x in mid-2022.
First reported: 16.09.2025 15:003 sources, 5 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix campaign uses AI-generated images to conceal malicious payloads.
First reported: 16.09.2025 15:003 sources, 5 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix campaign is considered the most mature and sophisticated to date, combining convincing phishing, tough code obfuscation, and robust steganography.
First reported: 16.09.2025 15:003 sources, 5 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix campaign has a broader range of high-value targets compared to ClickFix due to its use of File Explorer.
First reported: 16.09.2025 15:003 sources, 5 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix campaign is expected to see more attacks in the near future due to its effectiveness and novelty.
First reported: 16.09.2025 15:003 sources, 5 articlesShow sources
- Innovative FileFix Phishing Attack Proves Plenty Potent — www.darkreading.com — 16.09.2025 15:00
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix attack uses a multilingual phishing site to trick users into executing a malicious command via the File Explorer address bar.
First reported: 16.09.2025 15:332 sources, 4 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix attack leverages Bitbucket to host the malicious components, abusing a legitimate source code hosting platform to bypass detection.
First reported: 16.09.2025 15:332 sources, 4 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix attack involves a multi-stage PowerShell script that downloads an image, decodes it into the next-stage payload, and runs a Go-based loader to launch StealC.
First reported: 16.09.2025 15:332 sources, 4 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix attack uses advanced obfuscation techniques, including junk code and fragmentation, to hinder analysis efforts.
First reported: 16.09.2025 15:332 sources, 4 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix attack is more likely to be detected by security products due to the payload being executed by the web browser used by the victim.
First reported: 16.09.2025 15:332 sources, 4 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix attack demonstrates significant investment in tradecraft, with carefully engineered phishing infrastructure, payload delivery, and supporting elements to maximize evasion and impact.
First reported: 16.09.2025 15:332 sources, 4 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix attack is more sophisticated than ClickFix, as it abuses a widely used browser feature instead of the Run dialog or Terminal app.
First reported: 16.09.2025 15:332 sources, 4 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix attack has been observed in a campaign that uses a combination of fake support portals, Cloudflare CAPTCHA error pages, and clipboard hijacking to socially engineer victims into running malicious PowerShell code.
First reported: 16.09.2025 15:332 sources, 4 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix attack has been observed using an AutoHotkey (AHK) script to profile the compromised host and deliver additional payloads, including AnyDesk, TeamViewer, information stealers, and clipper malware.
First reported: 16.09.2025 15:332 sources, 3 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The FileFix attack has been observed using an MSHTA command pointing to a lookalike Google domain to retrieve and execute a remote malicious script.
First reported: 16.09.2025 15:332 sources, 3 articlesShow sources
- New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site — thehackernews.com — 16.09.2025 15:33
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The MetaStealer malware is a commodity infostealer known for harvesting credentials and stealing files.
First reported: 17.09.2025 17:011 source, 3 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The MetaStealer attack involves a fake Cloudflare Turnstile lure, the Windows search protocol, and an MSI package disguised as a PDF.
First reported: 17.09.2025 17:011 source, 3 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The MetaStealer attack uses a Windows shortcut LNK file disguised as a PDF file to execute malicious commands.
First reported: 17.09.2025 17:011 source, 3 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The MetaStealer attack involves a DLL sideloading technique using a legitimate SentinelOne executable.
First reported: 17.09.2025 17:011 source, 3 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The MetaStealer attack uses a custom search query as part of the search-ms URI protocol to redirect victims to an attacker-controlled SMB share.
First reported: 17.09.2025 17:011 source, 3 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The MetaStealer attack involves an MSI package containing a DLL and a CAB archive with additional malicious files.
First reported: 17.09.2025 17:011 source, 3 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The MetaStealer attack uses a large binary protected with Private EXE Protector to evade detection.
First reported: 17.09.2025 17:011 source, 3 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The MetaStealer attack targets crypto wallets and other sensitive information.
First reported: 17.09.2025 17:011 source, 3 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The MetaStealer attack involves a multi-stage infection chain that includes a fake PDF lure to grab the victim's hostname.
First reported: 17.09.2025 17:011 source, 3 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The MetaStealer attack uses a combination of social engineering and technical evasion techniques to deploy malware.
First reported: 17.09.2025 17:011 source, 3 articlesShow sources
- From ClickFix to MetaStealer: Dissecting Evolving Threat Actor Techniques — www.bleepingcomputer.com — 17.09.2025 17:01
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
ClickFix attacks now feature videos that guide victims through the self-infection process.
First reported: 06.11.2025 16:002 sources, 6 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
A timer is used to pressure victims into taking risky actions.
First reported: 06.11.2025 16:002 sources, 6 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The attacks automatically detect the operating system to provide the correct commands.
First reported: 06.11.2025 16:002 sources, 6 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Push Security researchers have observed these changes in recent ClickFix campaigns.
First reported: 06.11.2025 16:002 sources, 4 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The fake Cloudflare CAPTCHA verification challenge includes a one-minute countdown timer.
First reported: 06.11.2025 16:002 sources, 5 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The attacks are primarily promoted through malvertizing on Google Search.
First reported: 06.11.2025 16:002 sources, 6 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Threat actors exploit known flaws on outdated WordPress plugins to compromise legitimate sites.
First reported: 06.11.2025 16:002 sources, 6 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Threat actors use SEO poisoning tactics to rank malicious sites higher in search results.
First reported: 06.11.2025 16:002 sources, 6 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Payloads delivered in these attacks include MSHTA executable, PowerShell scripts, and living-off-the-land binaries.
First reported: 06.11.2025 16:002 sources, 6 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Future ClickFix attacks could run entirely in the browser, evading EDR protections.
First reported: 06.11.2025 16:002 sources, 5 articlesShow sources
- ClickFix malware attacks evolve with multi-OS support, video tutorials — www.bleepingcomputer.com — 06.11.2025 16:00
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Threat actors are abusing the decades-old Finger protocol to retrieve and execute remote commands on Windows devices.
First reported: 15.11.2025 20:462 sources, 4 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The Finger protocol is used to deliver commands that create a random-named path, download a zip archive disguised as a PDF, and extract a Python malware package.
First reported: 15.11.2025 20:462 sources, 4 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The Python program is executed using pythonw.exe __init__.py, and a callback is made to the attacker's server to confirm execution.
First reported: 15.11.2025 20:462 sources, 4 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
A related batch file indicates that the Python package is an infostealer.
First reported: 15.11.2025 20:462 sources, 4 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Another campaign uses the Finger protocol to retrieve and run commands that look for malware research tools and exit if found.
First reported: 15.11.2025 20:462 sources, 4 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
If no malware analysis tools are found, the commands download a zip archive disguised as PDF files and extract the NetSupport Manager RAT package.
First reported: 15.11.2025 20:462 sources, 4 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The commands configure a scheduled task to launch the remote access malware when the user logs in.
First reported: 15.11.2025 20:462 sources, 4 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The Finger protocol abuse appears to be carried out by a single threat actor conducting ClickFix attacks.
First reported: 15.11.2025 20:462 sources, 4 articlesShow sources
- Decades-old ‘Finger’ protocol abused in ClickFix malware attacks — www.bleepingcomputer.com — 15.11.2025 20:46
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Amatera Stealer is an evolution of ACR Stealer, available under a malware-as-a-service (MaaS) model with subscription plans ranging from $199 per month to $1,499 per year.
First reported: 17.11.2025 18:532 sources, 4 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Amatera Stealer targets crypto-wallets, browsers, messaging applications, FTP clients, and email services, employing advanced evasion techniques such as WoW64 SysCalls.
First reported: 17.11.2025 18:532 sources, 4 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Amatera Stealer is packed using PureCrypter, a C#-based multi-functional crypter and loader advertised as a MaaS offering by a threat actor named PureCoder.
First reported: 17.11.2025 18:532 sources, 4 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Amatera Stealer is injected into the MSBuild.exe process to harvest sensitive data and contact an external server to execute a PowerShell command to fetch and run NetSupport RAT.
First reported: 17.11.2025 18:532 sources, 4 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Amatera Stealer checks if the victim machine is part of a domain or has files of potential value, such as crypto wallets, before downloading NetSupport RAT.
First reported: 17.11.2025 18:532 sources, 4 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Recent phishing campaigns have propagated a wide range of malware families, including XWorm, NetSupport RAT, credential stealers, and phishing kits named Cephas and Tycoon 2FA.
First reported: 17.11.2025 18:532 sources, 5 articlesShow sources
- New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT — thehackernews.com — 17.11.2025 18:53
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Tycoon 2FA is a phishing kit that bypasses multi-factor authentication (MFA) and authentication apps by intercepting usernames, passwords, session cookies, and MFA flows in real-time.
First reported: 18.11.2025 17:012 sources, 5 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Tycoon 2FA has been used in over 64,000 attacks this year, primarily targeting Microsoft 365 and Gmail.
First reported: 18.11.2025 17:012 sources, 5 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Tycoon 2FA includes anti-detection layers such as Base64 encoding, LZ string compression, DOM vanishing, CryptoJS obfuscation, automated bot filtering, CAPTCHA challenges, and debugger checks.
First reported: 18.11.2025 17:012 sources, 5 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Tycoon 2FA can lead to total session takeover, allowing attackers to move laterally into SharePoint, OneDrive, email, Teams, HR systems, and finance systems.
First reported: 18.11.2025 17:012 sources, 5 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Legacy MFA methods like SMS codes, push notifications, and TOTP apps are vulnerable to Tycoon 2FA due to their reliance on user behavior.
First reported: 18.11.2025 17:012 sources, 5 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Criminal groups such as Scattered Spider, Octo Tempest, and Storm 1167 are using Tycoon 2FA daily.
First reported: 18.11.2025 17:012 sources, 5 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Phishing-proof MFA solutions, such as Token Ring and Token BioStick, use biometric authentication, proximity-based checks, and domain binding to prevent phishing attacks.
First reported: 18.11.2025 17:012 sources, 5 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Token Ring and Token BioStick solutions are inexpensive, available today, and provide a better user experience with faster authentication times.
First reported: 18.11.2025 17:012 sources, 5 articlesShow sources
- Tycoon 2FA and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Tycoon 2FA is a turnkey kit that removes the need for technical skill, making it accessible to anyone with a browser.
First reported: 18.11.2025 17:012 sources, 4 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Tycoon 2FA provides fake login pages and spins up reverse proxy servers, automating the phishing process.
First reported: 18.11.2025 17:012 sources, 5 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Tycoon 2FA intercepts usernames, passwords, session cookies, and MFA flows in real-time, allowing attackers to bypass MFA.
First reported: 18.11.2025 17:012 sources, 5 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Tycoon 2FA includes anti-detection layers such as Base64 encoding, LZ string compression, DOM vanishing, CryptoJS obfuscation, automated bot filtering, CAPTCHA challenges, and debugger checks.
First reported: 18.11.2025 17:012 sources, 5 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Tycoon 2FA can lead to total session takeover, allowing attackers to move laterally into SharePoint, OneDrive, email, Teams, HR systems, and finance systems.
First reported: 18.11.2025 17:012 sources, 5 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Legacy MFA methods like SMS codes, push notifications, and TOTP apps are vulnerable to Tycoon 2FA due to their reliance on user behavior.
First reported: 18.11.2025 17:012 sources, 5 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Criminal groups such as Scattered Spider, Octo Tempest, and Storm 1167 are using Tycoon 2FA daily.
First reported: 18.11.2025 17:012 sources, 5 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Phishing-proof MFA solutions, such as Token Ring and Token BioStick, use biometric authentication, proximity-based checks, and domain binding to prevent phishing attacks.
First reported: 18.11.2025 17:012 sources, 5 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Token Ring and Token BioStick solutions are inexpensive, available today, and provide a better user experience with faster authentication times.
First reported: 18.11.2025 17:012 sources, 5 articlesShow sources
- The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA — www.bleepingcomputer.com — 18.11.2025 17:01
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
A new operation embedding StealC V2 inside Blender project files has been observed targeting victims for at least six months.
First reported: 24.11.2025 16:003 sources, 4 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The attackers placed manipulated .blend files on platforms such as CGTrader, where users downloaded them as routine 3D assets.
First reported: 24.11.2025 16:003 sources, 4 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
When opened with Blender’s Auto Run feature enabled, the files executed concealed Python scripts that launched a multistage infection.
First reported: 24.11.2025 16:003 sources, 4 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The infection chain began with a tampered Rig_Ui.py script embedded inside the .blend file.
First reported: 24.11.2025 16:003 sources, 4 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
This script fetched a loader from a remote workers.dev domain, which then downloaded a PowerShell stage and two ZIP archives containing Python-based stealers.
First reported: 24.11.2025 16:003 sources, 4 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Once extracted into the Windows temp directory, the malware created LNK files to secure persistence, then used Pyramid C2 channels to retrieve encrypted payloads.
First reported: 24.11.2025 16:003 sources, 4 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
StealC V2, promoted on underground forums since April 2025, has rapidly expanded its feature set.
First reported: 24.11.2025 16:003 sources, 4 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
It now targets more than 23 browsers, over 100 plugins, more than 15 desktop wallets, and a range of messaging, VPN and mail clients.
First reported: 24.11.2025 16:003 sources, 4 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Its pricing, from $200 per month to $800 for 6 months, has made it accessible to low-tier cybercriminals seeking ready-to-use tools.
First reported: 24.11.2025 16:003 sources, 4 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Several indicators of compromise (IoCs) surfaced during the investigation, including malicious .blend files hosted on CGTrader, payload retrieval through multiple workers.dev domains, ZIP archives containing Python stealers and persistence components, and command-and-control (C2) communication across several Pyramid-linked IPs.
First reported: 24.11.2025 16:003 sources, 3 articlesShow sources
- Russian-linked Malware Campaign Hides in Blender 3D Files — www.infosecurity-magazine.com — 24.11.2025 16:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
ClickFix attack variants have been observed using a realistic-looking Windows Update animation in a full-screen browser page to trick users into executing malicious commands.
First reported: 24.11.2025 22:422 sources, 4 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The new ClickFix variants drop the LummaC2 and Rhadamanthys information stealers.
First reported: 24.11.2025 22:422 sources, 4 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The attack uses steganography to encode the final malware payload inside an image.
First reported: 24.11.2025 22:422 sources, 4 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The process involves multiple stages that use PowerShell code and a .NET assembly (the Stego Loader) responsible for reconstructing the final payload embedded inside a PNG file in an encrypted state.
First reported: 24.11.2025 22:422 sources, 4 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The shellcode holding the infostealer samples is packed using the Donut tool.
First reported: 24.11.2025 22:422 sources, 4 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The Rhadamanthys variant that used the Windows Update lure was first spotted by researchers back in October, before Operation Endgame took down parts of its infrastructure on November 13.
First reported: 24.11.2025 22:422 sources, 4 articlesShow sources
- ClickFix attack uses fake Windows Update screen to push malware — www.bleepingcomputer.com — 24.11.2025 22:42
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The StealC V2 malware used in this campaign was the latest variant of the second major version of the malware.
First reported: 25.11.2025 00:002 sources, 4 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The StealC malware supports exfiltration from 23+ browsers, with server-side credential decryption and compatibility with Chrome 132+.
First reported: 25.11.2025 00:002 sources, 4 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The StealC malware supports exfiltration from 100+ cryptocurrency wallet browser extensions and 15+ cryptocurrency wallet apps.
First reported: 25.11.2025 00:002 sources, 4 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The StealC malware supports exfiltration from Telegram, Discord, Tox, Pidgin, VPN clients (ProtonVPN, OpenVPN), and mail clients (Thunderbird).
First reported: 25.11.2025 00:002 sources, 4 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The StealC malware has an updated UAC bypass mechanism.
First reported: 25.11.2025 00:002 sources, 4 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The malware loader is fetched from a Cloudflare Workers domain.
First reported: 25.11.2025 00:002 sources, 4 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The PowerShell script retrieves two ZIP archives, ZalypaGyliveraV1 and BLENDERX, from attacker-controlled IPs.
First reported: 25.11.2025 00:002 sources, 4 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The archives unpack into the %TEMP% folder and drop LNK files in the Startup directory for persistence.
First reported: 25.11.2025 00:002 sources, 4 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The campaign deploys two payloads: the StealC infostealer and an auxiliary Python stealer, likely used for redundancy.
First reported: 25.11.2025 00:002 sources, 4 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
No security engine on VirusTotal detected the StealC variant analyzed by Morphisec.
First reported: 25.11.2025 00:002 sources, 4 articlesShow sources
- Malicious Blender model files deliver StealC infostealing malware — www.bleepingcomputer.com — 25.11.2025 00:00
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The campaign has been active for at least six months, involving the implantation of malicious .blend files on platforms like CGTrader.
First reported: 25.11.2025 13:282 sources, 3 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The attack chains involve uploading malicious .blend files to free 3D asset sites such as CGTrader containing a malicious "Rig_Ui.py" script.
First reported: 25.11.2025 13:282 sources, 3 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The malicious "Rig_Ui.py" script is executed as soon as the .blend files are opened with Blender's Auto Run feature enabled.
First reported: 25.11.2025 13:282 sources, 3 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The Rig_Ui.py script fetches a PowerShell script to download two ZIP archives.
First reported: 25.11.2025 13:282 sources, 3 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
One of the ZIP files contains a payload for StealC V2, while the second archive deploys a secondary Python-based stealer on the compromised host.
First reported: 25.11.2025 13:282 sources, 3 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The updated version of StealC, first announced in late April 2025, supports a wide range of information gathering features, allowing data to be extracted from 23 browsers, 100 web plugins and extensions, 15 cryptocurrency wallet apps, messaging services, VPNs, and email clients.
First reported: 25.11.2025 13:282 sources, 3 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The campaign shares similarities with a prior campaign linked to Russian-speaking threat actors that involved impersonating the Electronic Frontier Foundation (EFF) to target the online gaming community and infect them with StealC and Pyramid C2.
First reported: 25.11.2025 13:282 sources, 3 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The assessment is based on tactical similarities in both campaigns, including using decoy documents, evasive techniques, and background execution of malware.
First reported: 25.11.2025 13:282 sources, 3 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Blender's documentation acknowledges the security risk posed by the ability to include Python scripts within blend-files, which can execute arbitrary Python scripts.
First reported: 25.11.2025 13:282 sources, 3 articlesShow sources
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware — thehackernews.com — 25.11.2025 13:28
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
A new campaign codenamed JackFix leverages fake adult websites (xHamster, PornHub clones) as its phishing mechanism, likely distributed via malvertising.
First reported: 25.11.2025 16:182 sources, 2 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The JackFix campaign displays highly convincing fake Windows update screens in an attempt to get the victim to run malicious code.
First reported: 25.11.2025 16:182 sources, 2 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The attack heavily leans on obfuscation to conceal ClickFix-related code and blocks users from escaping the full-screen alert by disabling the Escape and F11 buttons, along with F5 and F12 keys.
First reported: 25.11.2025 16:182 sources, 2 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The initial command executed is an MSHTA payload that's launched using the legitimate mshta.exe binary, which contains JavaScript designed to run a PowerShell command to retrieve another PowerShell script from a remote server.
First reported: 25.11.2025 16:182 sources, 2 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The PowerShell script attempts to elevate privileges and creates Microsoft Defender Antivirus exclusions for command-and-control (C2) addresses and paths where the payloads are staged.
First reported: 25.11.2025 16:182 sources, 2 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The PowerShell script serves up to eight different payloads, including Rhadamanthys Stealer, Vidar Stealer 2.0, RedLine Stealer, Amadey, and other unspecified loaders and RATs.
First reported: 25.11.2025 16:182 sources, 2 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The threat actor often changes the URI used to host the first mshta.exe stage and has been observed moving from hosting the second stage on the domain securitysettings.live to xoiiasdpsdoasdpojas.com, although both point to the same IP address 141.98.80.175.
First reported: 25.11.2025 16:182 sources, 2 articlesShow sources
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers — thehackernews.com — 25.11.2025 16:18
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Storm-0249 abuses endpoint detection and response (EDR) solutions and trusted Microsoft Windows utilities to load malware, establish communication, and persistence in preparation for ransomware attacks.
First reported: 09.12.2025 17:241 source, 1 articleShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Storm-0249 has moved beyond mass phishing and adopted stealthier, more advanced methods that prove effective and difficult for defenders to counter.
First reported: 09.12.2025 17:241 source, 1 articleShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Storm-0249 leveraged the SentinelOne EDR components to hide malicious activity, but the same method works with other EDR products.
First reported: 09.12.2025 17:241 source, 1 articleShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The attack started with ClickFix social engineering that tricked users into pasting and executing curl commands in the Windows Run dialog to download a malicious MSI package with SYSTEM privileges.
First reported: 09.12.2025 17:241 source, 1 articleShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
A malicious PowerShell script is fetched from a spoofed Microsoft domain, which is piped straight onto the system's memory, never touching the disk and thus evading antivirus detection.
First reported: 09.12.2025 17:241 source, 1 articleShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The MSI file drops a malicious DLL (SentinelAgentCore.dll), which is placed strategically alongside the pre-existing, legitimate SentinelAgentWorker.exe, which is already installed as part of the victim's SentinelOne EDR.
First reported: 09.12.2025 17:241 source, 1 articleShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The attacker loads the DLL using the signed SentinelAgentWorker (DLL sideloading), executing the file within the trusted, privileged EDR process and obtaining stealthy persistence that survives operating system updates.
First reported: 09.12.2025 17:241 source, 1 articleShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The legitimate process runs the attacker's code, appearing as routine SentinelOne activity to security tools and bypassing detection.
First reported: 09.12.2025 17:241 source, 1 articleShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Once the attacker gains access, they use the SentinelOne component to collect system identifiers through legitimate Windows utilities like reg.exe and findstr.exe, and to funnel encrypted HTTPS command-and-control (C2) traffic.
First reported: 09.12.2025 17:241 source, 1 articleShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
Registry queries and string searches conducted from within a trusted EDR process are treated as routine and ignored by security mechanisms.
First reported: 09.12.2025 17:241 source, 1 articleShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The compromised systems are profiled using 'MachineGuid,' a unique hardware-based identifier that ransomware groups like LockBit and ALPHV use for binding encryption keys to specific victims.
First reported: 09.12.2025 17:241 source, 1 articleShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
The abuse of trusted, signed EDR processes bypasses nearly all traditional monitoring.
First reported: 09.12.2025 17:241 source, 1 articleShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
System administrators are recommended to rely on behavior-based detection that identifies trusted processes loading unsigned DLLs from non-standard paths.
First reported: 09.12.2025 17:241 source, 1 articleShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
-
It is helpful to set stricter controls for curl, PowerShell, and LoLBin execution.
First reported: 09.12.2025 17:241 source, 1 articleShow sources
- Ransomware IAB abuses EDR for stealthy malware execution — www.bleepingcomputer.com — 09.12.2025 17:24
Similar Happenings
ShadyPanda Browser Extensions Campaign Exploits 4.3M Installs
The ShadyPanda campaign has amassed over 4.3 million installations of malicious Chrome and Edge browser extensions, evolving from legitimate tools into spyware over multiple phases. The extensions, discovered by Koi Security, engaged in affiliate fraud, search hijacking, and remote code execution. The campaign remains active on the Microsoft Edge Add-ons platform, with one extension having 3 million installs. The extensions collect browsing history, search queries, keystrokes, mouse clicks, and other sensitive data, exfiltrating it to domains in China. Users are advised to remove these extensions and reset their account passwords. Five of the extensions started as legitimate programs before malicious changes were introduced in mid-2024. The Clean Master extension was featured and verified by Google, allowing attackers to expand their user base and issue malicious updates without suspicion. The extensions engage in adversary-in-the-middle (AitM) attacks to facilitate credential theft, session hijacking, and arbitrary code injection into any website. The WeTab extension is still available for download as of the article's publication date. The extensions injected affiliate tracking codes silently every time the victim clicked on eBay, Amazon, or Booking.com links. They also deployed Google Analytics tracking to monetize browsing data, logging every website visit, search query, and click pattern. The Infinity V+ extension redirected web searches through the browser hijacker trovi.com. The extensions used malicious code to read victims’ cookies and send the data to nossl.dergoodting.com, creating unique identifiers without users’ consent or knowledge. They captured users’ input in the search box, profiling their interests in real time. The extensions checked an external server for instructions and executed arbitrary JavaScript code every hour, with full browser API access. They executed a payload designed to exfiltrate browser data to remote servers, collecting visited URLs, HTTP referrers, timestamps, persistent UUID4 identifiers, and complete browser fingerprints. The WeTab New Tab Page extension, posing as a productivity tool, operates as a sophisticated surveillance platform, sending user data to 17 different domains. The ShadyPanda campaign has been active for seven years, with initial submissions in 2018 and first signs of malicious activity in 2023. ShadyPanda leveraged trusted browser marketplaces to build user bases, operate legitimately for years, then quietly deploy malicious updates. A new Koi Security report identified a remote code execution backdoor affecting 300,000 users across five extensions, including Clean Master. The extensions had operated normally since 2018, until a mid-2024 update enabled hourly downloads of arbitrary JavaScript. The malware logged website visits, exfiltrated encrypted browsing histories, and gathered full browser fingerprints. A parallel spyware operation reached more than 4 million users through five additional Microsoft Edge extensions, most notably WeTab, which alone accounted for 3 million installs. These extensions collected every URL visited, search term, mouse click, and various browser identifiers, with traffic routed to servers in China.
Bloody Wolf APT Expands Operations in Central Asia Using NetSupport RAT
The Bloody Wolf APT group has expanded its cyber campaign across Central Asia, targeting government entities in Kyrgyzstan and Uzbekistan. The group has shifted from traditional malware to using legitimate remote-access software, specifically NetSupport RAT, deployed via Java-based delivery methods. The campaign involves sophisticated social engineering tactics, including impersonating government ministries and using geofenced infrastructure to deliver malicious payloads. The group's activities have been ongoing since at least June 2025, with a notable increase in operations by October 2025. The infection chain involves downloading a JAR file that fetches additional components, installs NetSupport RAT, and adds persistence mechanisms. The group uses custom JAR generators to produce varied samples, reducing the likelihood of detection. The campaign has also targeted finance and IT sectors. The shift to legitimate remote-administration tools indicates an evolution in the group's tactics to evade detection and blend into normal IT activity.
Matrix Push C2 Malware Delivery via Browser Push Notifications
Cybercriminals are exploiting browser push notifications to deliver malware through a newly discovered command-and-control (C2) platform called Matrix Push C2. This platform tricks users into allowing notifications, which are then used to redirect them to malicious sites, monitor infected clients in real time, and scan for cryptocurrency wallets. The attack is fileless, operating through the browser's notification system without requiring traditional malware files on the system. The campaign is orchestrated via a web-based dashboard that provides real-time intelligence on victims, including detailed information on each infected client. The platform includes analytics and link management tools to measure campaign effectiveness and adjust tactics. Social engineering templates for brands like MetaMask, Netflix, and PayPal are used to maximize the credibility of fake messages. Matrix Push C2 is offered as a malware-as-a-service (MaaS) kit, sold under a tiered subscription model with payments accepted in cryptocurrency. The platform was first observed in October 2025 and has been active since then.
Chinese State-Sponsored Group Exploits Windows Zero-Day in Espionage Campaign Against European Diplomats
A China-linked hacking group, UNC6384 (Mustang Panda), is exploiting a Windows zero-day vulnerability (CVE-2025-9491) to target European diplomats in Hungary, Belgium, Italy, the Netherlands, and Serbian government agencies. The campaign involves spearphishing emails with malicious LNK files to deploy the PlugX RAT and gain persistence on compromised systems. The attacks have broadened in scope to include diplomatic entities from Italy and the Netherlands. The zero-day vulnerability allows for remote code execution on targeted Windows systems, enabling the group to monitor diplomatic communications and steal sensitive data. Microsoft has not yet released a patch for this vulnerability, which has been heavily exploited by multiple state-sponsored groups and cybercrime gangs since March 2025. Microsoft has silently mitigated the vulnerability by changing LNK files in the November updates to display all characters in the Target field, not just the first 260. ACROS Security has also released an unofficial patch to limit shortcut target strings to 260 characters and warn users about potential dangers.
Increased Botnet Activity Targeting PHP Servers, IoT Devices, and Cloud Gateways
Botnets such as Mirai, Gafgyt, and Mozi are exploiting known vulnerabilities and cloud misconfigurations to target PHP servers, IoT devices, and cloud gateways. This trend is driven by the widespread use of PHP in web applications and the prevalence of cloud misconfigurations, which expand the attack surface. The attacks aim at remote code execution (RCE) and data theft. The vulnerabilities exploited include CVE-2022-47945 in ThinkPHP, CVE-2021-3129 in Laravel Ignition, and CVE-2017-9841 in PHPUnit. Additionally, insecure configurations and exposed AWS credentials are being targeted. IoT devices with outdated firmware and cloud-native environments are also at risk, with botnets being used for credential stuffing and password spraying campaigns. Xdebug debugging sessions are being exploited to gain insight into application behavior or extract sensitive data. The scanning activity often originates from cloud infrastructures like Amazon Web Services (AWS), Google Cloud, Microsoft Azure, Digital Ocean, and Akamai Cloud, illustrating how threat actors are abusing legitimate services to their advantage while obscuring their true origins.