Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

Windsurf CEO goes to Google. Openai’s acquisition is falling apart

IPO Firefly Aerospace File

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers use Tiktok videos to distribute Vidar and Stealc malware via Clickfix techniques
Identity

Hackers use Tiktok videos to distribute Vidar and Stealc malware via Clickfix techniques

userBy userMay 23, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

The malware known as Latrodectus is the latest to embrace a widely used social engineering technology called Clickfix as a distribution vector.

“Clickfix techniques are particularly dangerous because malware can be run in memory rather than being written to disk,” the report shared with Hacker News states. “This will give you more opportunities for browsers and security tools to detect or block malware.”

Latrodectus, considered to be the successor to IcedID, is a name given to malware that acts as a downloader for other payloads, such as ransomware. It was first documented in April 2024 by ProofPoint and Team Cymru.

Incidentally, this malware is one of many malicious software that suffers operational setbacks as part of the operational Endgame, defeating 300 servers around the world, 650 domains related to Bumblebee, lacrotectus, Qakbot, Hijackloader, Danabot, Trickbot and Warmcokie on May 19th, 2025.

Cybersecurity

In the latest set of Latrodectus attacks observed by Expel in May 2025, unsuspecting users will be tricked into copying and running PowerShell commands from infected websites.

“When a user runs these commands use MSIEXEC to install files at the remote URL and try to run them in memory,” Expel said. “This eliminates the need for attackers to write files to their computers and runs the risk of being detected by antiviruses that could be detected on a browser or disk.”

The MSI installer contains legitimate NVIDIA applications that are used to sideload malicious DLLs. This will use Curl to download the main payload.

To mitigate this type of attack, we recommend using Group Policy Objects (GPOs) to disable the Windows Run program or turning off the “Windows+R” hotkey via changes to the Windows registry.

From Clickfix to Tiktok

This disclosure comes when Trend Micro reveals details about its new engineering campaign. This revealed that instead of relying on fake Captcha pages, it is likely to provide Vidar and StealC information steel by instructing users to run malicious commands on systems to activate Windows, Microsoft Office, Capcut, and Spotify using Tiktok videos generated using artificial intelligence (AI) tools.

These videos have been posted from various Tiktok accounts such as @gitallowed, @zane.houghton, @allaivo2, @sysglow.wow, @alexfixpc, and @digitaldreams771. These accounts are no longer active. One video claiming to provide instructions on how to “improve your Spotify experience instantly” has accumulated almost 500,000 views with over 20,000 likes and over 100 comments.

This campaign marks a new escalation of Clickfix in that it is visually guided by users searching for how to activate pirated apps, and is visually guided to open Windows Run dialogs by launching “Windows + R” hotkey, PowerShell, running highlighted commands in the video, and ultimately registering your own system.

“Threat Actors is currently running Powershell commands to use social engineer users using Tiktok videos that are potentially generated using tools with AI to use social engineer users to activate legitimate software or unleash premium features.”

“The campaign highlights that attackers are ready to weaponize the currently popular social media platforms for distributing malware.”

Fake ledger app used to steal seed phrases for Mac users

The findings continue to discover four different malware campaigns that leverage the cloned version of the Ledger Live app to steal sensitive data, such as seed phrases, with the goal of ejecting victims’ cryptocurrency wallets. Activities have been continuing since August 2024.

Cybersecurity

The attack uses a malicious DMG file that launches Applescript on startup to remove passwords and Apple note data and downloads the Trojanized version of Ledger Live. When the app is opened, it warns users of expected account issues and warns that seed phrases are required for recovery. The seed phrase entered is sent to the attacker control server.

MoonLock Lab, which shed light on the campaign, said the Rogue app uses Macos Stealer Malware, such as Atomic Macos Stealer (AMOS) and Odyssey.

“The dark web forum has grown chat about anti-leisure schemes. The next wave is already in shape,” says MacPaw’s cybersecurity department. “Hackers will continue to utilize the ownership trust of Crypto, which is located in Ledger Live.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUS judge blocks Trump’s efforts to ban Harvard University from registering foreign students | Education News
Next Article Openai upgrades operator agent powered AI models
user
  • Website

Related Posts

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

July 12, 2025

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

July 11, 2025

perfektblue bluetooth vulnerability exposes millions of vehicles to remote code execution

July 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

Windsurf CEO goes to Google. Openai’s acquisition is falling apart

IPO Firefly Aerospace File

Can “ethical” spyware makers justify offering their technology to ice?

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.