Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

UK backs new technology, gives cutting-edge medical equipment a major boost

ClickFix campaign exploits compromised sites to deploy MIMICRAT RAT

New metrics shaping cyber insurance in 2026

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » ClickFix campaign exploits compromised sites to deploy MIMICRAT RAT
Identity

ClickFix campaign exploits compromised sites to deploy MIMICRAT RAT

userBy userFebruary 20, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rabi LakshmananFebruary 20, 2026Malware/Threat Intelligence

Cybersecurity researchers have revealed details of a new ClickFix campaign that exploits compromised legitimate sites to deliver a previously undocumented remote access Trojan (RAT) called MIMICRAT (also known as AstarionRAT).

“This campaign demonstrates a high level of operational sophistication, with compromised sites across multiple industries and geographies serving as the delivery infrastructure, a multi-stage PowerShell chain performing ETW and AMSI bypass before dropping a Lua-scripted shellcode loader, and the final implant communicating over HTTPS on port 443 using an HTTP profile similar to legitimate web analytics traffic,” Elastic Security Labs said in a Friday report.

According to the enterprise search and cybersecurity company, MIMICRAT is a custom C++ RAT that supports Windows token impersonation, SOCKS5 tunneling, and a set of 22 commands for comprehensive post-exploitation functionality. The campaign was discovered earlier this month.

There is also tactical and infrastructure overlap with another ClickFix campaign documented by Huntress, leading to the deployment of the Matanbuchus 3.0 loader, which is assessed to serve as a conduit for the same RAT. The ultimate goal of the attack is believed to be ransomware deployment or data leakage.

In the infection sequence highlighted in Elastic, the entry point is bincheck[.]io, a legitimate Bank Identification Number (BIN) verification service, was compromised to inject malicious JavaScript code that loaded an externally hosted PHP script. The PHP script then displays a fake Cloudflare verification page and uses Windows to address the issue.[ファイル名を指定して実行]It delivers the ClickFix decoy by instructing the victim to copy and paste a command into a dialog.

This runs a PowerShell command that connects to the command and control (C2) server to retrieve a second stage PowerShell script that patches the Windows Event Log (ETW) and antivirus scanning (AMSI) before dropping the Lua-based loader. In the final stage, the Lua script is decrypted and the shellcode that serves MIMICRAT is executed in memory.

The Trojan uses HTTPS to communicate with the C2 server and can accept 24 commands for process and file system control, interactive shell access, token manipulation, shellcode injection, and SOCKS proxy tunneling.

“The campaign supports 17 languages, and the lure content is dynamically localized based on the victim’s browser language settings, increasing its effective reach,” said security researcher Salim Bittam. “Identified victims span multiple geographies, including a U.S.-based university and multiple Chinese-speaking users documented in public forum discussions, suggesting widespread opportunistic targeting.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNew metrics shaping cyber insurance in 2026
Next Article UK backs new technology, gives cutting-edge medical equipment a major boost
user
  • Website

Related Posts

New metrics shaping cyber insurance in 2026

February 20, 2026

Ukrainian citizen sentenced to 5 years in prison for North Korean IT worker fraud case

February 20, 2026

Three former Google engineers charged with transferring trade secrets to Iran

February 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

UK backs new technology, gives cutting-edge medical equipment a major boost

ClickFix campaign exploits compromised sites to deploy MIMICRAT RAT

New metrics shaping cyber insurance in 2026

Ukrainian citizen sentenced to 5 years in prison for North Korean IT worker fraud case

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.