Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

A Pre-Auth Exploit chain found in Commvault could allow remote code execution attacks

Cybercriminals Deploy Cornflake.v3 Backdoor Clickfix Tactics and Fake Captcha Pages

Procuring multiple rounds of venture capital could be wrong for your startup

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cybercriminals Deploy Cornflake.v3 Backdoor Clickfix Tactics and Fake Captcha Pages
Identity

Cybercriminals Deploy Cornflake.v3 Backdoor Clickfix Tactics and Fake Captcha Pages

userBy userAugust 21, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 21, 2025Ravi LakshmananMalware/Cryptocurrency

Fake capture page

It has been observed that threat actors who harness deceptive social engineering tactics known as Clickfix will deploy the versatile backdoor code name Cornflake.v3.

Mandiant, owned by Google, described the activity it tracks as UNC5518. This is described as part of the access scheme as access as a service that uses fake Captcha pages as lures to provide initial access to the system, and is then monetized by other threat groups.

“The first infection vector, called Clickfix, copies a malicious PowerShell script to the user on the compromised website, and[Windows実行]It involves directing you to run through a dialog box,” Google said in a report published today.

Cybersecurity

The access provided by UNC5518 is evaluated as being utilized by at least two different hacking groups, UNC5774 and UNC4108, to initiate the multi-stage infection process and drop additional payloads –

UNC5774, another financially motivated group that provides cornflakes as a way to deploy various subsequent payloads is the threat actors with unknown motivation to deploy tools such as Voltmarker and NetSupport rats using PowerShell;

The attack chain can start with the victim landing a fake Captcha verification page after interacting with search results that use search engine optimization (SEO) addiction or malicious ads.

The user is then fooled by the malicious PowerShell command execution by launching the Windows Run dialog and runs the next-stage dropper payload from the remote server. The newly downloaded script checks whether it is running within a virtualized environment and eventually launches Cornflake.v3.

Observed in both JavaScript and PHP versions, Cornflake.v3 is a backdoor that supports the execution of payloads over HTTP, including executables, dynamic link libraries (DLLs), JavaScript files, batch scripts, and PowerShell commands. It also allows you to collect basic system information and send it to an external server. To avoid detection, traffic is proxyed through the CloudFlare tunnel.

“cornflake.v3 is an updated version of cornflake.v2, and shares a significant portion of the codebase,” said Mandiant researcher Marco Gali. “Unlike V2, which acts only as a downloader, V3 has host persistence via the registry execution key and supports additional payload types.”

Both generations are significantly different from C-based downloaders that use TCP sockets for Command and Control (C2) communication and have the ability to perform DLL payloads.

Host persistence is achieved through changes to the Windows registry. At least three different payloads will be delivered via Cornflake.v3. It consists of an active directory reconnaissance utility, a script to harvest qualifications via KerberoAsting, and another backdoor called Windytwist.sea.

It has also been observed that the selected version of Windytwist.sea is attempting to move laterally across the network of infected machines.

Identity Security Risk Assessment

“To mitigate the execution of malware via Clickfix, organizations can as much as possible.[Windows実行]You need to disable the dialog box,” Galli said. “Regular simulation exercises are important to counter this and other social engineering tactics. Additionally, robust logging and monitoring systems are essential to detect subsequent payload executions, such as those related to Cornflake.v3.”

USB infection will remove Xmrig Miner

This disclosure comes when threat intelligence companies detail the ongoing campaign from September 2024 onwards to infect other hosts and employ USB drives to deploy cryptocurrency miners.

“This demonstrates the continued effectiveness of initial access through infected USB drives,” Mandiant said. “The low cost and the ability to bypass network security make this a compelling option for attackers.”

The attack chain begins when the victim is tricked into running a Windows Shortcut (LNK) on the compromised USB drive. LNK files allow you to run Visual Basic Script, which is also in the same folder. The script launches a batch script to start an infection –

A C++ DLL launcher that starts running other malicious components such as Dirtybulk, Cutfail, C++ malware dropper responsible for decrypting and installing malware on systems such as HighReps and Pumpbench, and a C++ backdoor that facilitates reconnaissance, such as third libraries like OpenSSL, libcurl, winpthreadgc high high reptes flesecens aa withreadgc high repreps, Pumpbench, a C++ backdoor that facilitates reconnaissance, such as PostgreSQL database servers, provides remote access, and downloads Xmrig Xmrig, an open source software for mining cryptocurrencies such as Monero, Dero, Ravencoin.

“Infecting USB drives spreads the pump bench,” Mandiant says. “Scan the system on available drives and then create batch files, VBScript files, shortcut files, and DAT files.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleProcuring multiple rounds of venture capital could be wrong for your startup
Next Article A Pre-Auth Exploit chain found in Commvault could allow remote code execution attacks
user
  • Website

Related Posts

A Pre-Auth Exploit chain found in Commvault could allow remote code execution attacks

August 21, 2025

Hackers spreading Agent Tesla, Asyncrat and Snake KeyLogger using the new QuirkyLoader malware

August 21, 2025

Important findings from Blue Report 2025

August 21, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

A Pre-Auth Exploit chain found in Commvault could allow remote code execution attacks

Cybercriminals Deploy Cornflake.v3 Backdoor Clickfix Tactics and Fake Captcha Pages

Procuring multiple rounds of venture capital could be wrong for your startup

Google’s AI mode will be expanded globally with new agent functionality added

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know

What’s Wrong with the Web? Tim Berners-Lee Speaks Out in Rare Interview

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.