Malware & RansomwareHIGH

DeepLoad Malware - ClickFix Tactic Steals Browser Credentials

Featured image for DeepLoad Malware - ClickFix Tactic Steals Browser Credentials
THThe Hacker News
DeepLoadClickFixcredential theftWMI persistencePowerShell
🎯

Basically, DeepLoad is a sneaky malware that steals your passwords using clever tricks.

Quick Summary

A new malware called DeepLoad is using ClickFix tactics to steal browser credentials. This affects users who may unknowingly run malicious commands. The risk is significant as sensitive information can be compromised without detection.

What Happened

A new malware campaign has emerged, leveraging the ClickFix social engineering tactic to distribute a previously undocumented malware loader known as DeepLoad. This campaign tricks users into executing malicious PowerShell commands under the guise of fixing a non-existent issue. Researchers from ReliaQuest have highlighted that the malware employs AI-assisted obfuscation and process injection techniques to evade detection, starting its credential theft operations almost immediately.

The attack begins with a ClickFix lure, prompting users to paste a command into the Windows Run dialog. This action triggers mshta.exe, a legitimate Windows utility, to download and execute an obfuscated PowerShell loader. The loader is designed to hide its true functionality among meaningless variable assignments, making it difficult for security tools to identify its malicious intent.

Who's Being Targeted

The primary targets of DeepLoad are users who may inadvertently run the malicious commands. Once executed, the malware blends in with regular Windows activity, disguising itself within the legitimate process LockAppHost.exe, which manages the lock screen. This stealthy approach helps it avoid detection by security software, allowing it to operate undetected on infected systems.

DeepLoad's design includes features that facilitate credential theft by extracting passwords from browsers. It also installs a malicious browser extension that captures credentials entered on login pages, maintaining persistence across user sessions unless manually removed. This capability significantly increases the risk for users, as their sensitive information can be compromised without their knowledge.

Signs of Infection

Indicators of infection may include unusual browser behavior, unexpected prompts to install extensions, or sudden performance issues. Users may notice that their passwords are being captured without any apparent reason. Additionally, the malware's ability to disable PowerShell command history and invoke core Windows functions directly makes it harder to trace its activities.

DeepLoad also employs a tactic called WMI persistence, which allows it to reinfect a clean host three days after the initial infection without any user or attacker interaction. This method breaks the parent-child process chains that most detection rules rely on, making it even more challenging to identify and remove the threat.

How to Protect Yourself

To protect against DeepLoad and similar malware, users should maintain updated antivirus software and be cautious about executing commands from untrusted sources. Regularly reviewing browser extensions and removing any that appear suspicious can help mitigate risks.

It's also advisable to enable two-factor authentication on accounts whenever possible, as this adds an additional layer of security. Users should regularly change their passwords and monitor their accounts for any unauthorized access. Being aware of social engineering tactics like ClickFix can help users avoid falling victim to such attacks in the future.

🔒 Pro insight: DeepLoad's use of WMI for persistence highlights a growing trend in malware evasion techniques, making traditional detection methods less effective.

Original article from

THThe Hacker News
Read Full Article

Related Pings

HIGHMalware & Ransomware

DeepLoad - AI-Powered Credential-Stealing Malware Discovered

DeepLoad is a new malware that uses AI to steal credentials from enterprise systems. This poses serious risks as it can evade traditional security measures. Organizations must adapt their defenses to counteract these advanced threats.

CyberScoop·
HIGHMalware & Ransomware

Telnyx - Malicious PyPI Package Poisoning Incident

A recent PyPI package poisoning incident has compromised Telnyx's SDK, potentially impacting thousands of developers. Users should verify their installations and rotate credentials if affected.

The Register Security·
HIGHMalware & Ransomware

TheGentlemen Ransomware - Exposed Toolkit and Victim Data

A misconfigured server has exposed TheGentlemen ransomware's toolkit, including victim credentials and Ngrok tokens. This breach poses significant risks to organizations globally. Security teams must act quickly to mitigate potential impacts.

Cyber Security News·
HIGHMalware & Ransomware

CrySome RAT - New Advanced .NET Malware Emerges

A new malware, CrySome RAT, targets Windows systems, allowing hackers to control machines undetected. Its persistence and evasion techniques pose significant risks. Users must act quickly to protect their systems.

Cyber Security News·
HIGHMalware & Ransomware

ClickFix Variant - New Malware Evades PowerShell Detection

A new ClickFix variant is exploiting Windows tools to deliver malware undetected. Windows users are at risk as this stealthy technique bypasses traditional security measures. Organizations must enhance their defenses to counteract this evolving threat.

Cyber Security News·
HIGHMalware & Ransomware

AI and ClickFix - New Malware Campaign Discovered

A new malware campaign is using AI alongside ClickFix techniques to evade detection. This poses a serious risk to organizations, especially in tech-heavy sectors. Stay informed and vigilant against these evolving threats.

Cybersecurity Dive·