Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Things AI can do, but laws won’t allow: 16 profitable AI ideas big tech won’t touch (but you can)

California’s Track and Field Finals begin to follow the controversy over trans athletes

Saudi Arabia says it will fund Syrian salaries in jointly with Qatar | Syrian War News

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Rust-based Eddiestealer malware steals browser data using Clickfix Captcha Trick
Identity

Rust-based Eddiestealer malware steals browser data using Clickfix Captcha Trick

userBy userMay 30, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Clickfix Captcha

The new malware campaign uses popular Clickfix social engineering tactics launched via fake Captcha verification pages to distribute a new Rust-based information steeler called Eddiestealer.

“This campaign leverages the deceit captcha validation page, in which users run malicious PowerShell scripts that ultimately deploy Infostealer to harvest sensitive data such as credentials, browser information, cryptocurrency wallet details and more.”

The attack chain starts with a threat actor who compromises a legitimate website with a malicious JavaScript payload that provides fake capture check pages. [a] Robot “A common tactic called Clickfix by following a three-stage process.

This involves opening a Windows Run dialog prompt to potential victims and then opening the already copied command “Validation window” (i.e.[実行]Paste it into the dialog box and press Enter. This will run the obfuscated PowerShell command and retrieve the next stage payload from the external server (“LLLL[.]fit”).

The JavaScript payload (“gverify.js”) is then saved in the victim’s download folder and executed using cscript in a hidden window. The main goal of the interim script is to retrieve the eddiestealer binary from the same remote server and save it in the download folder with pseudo-random 12 character file names.

Written in Rust, Eddiestealer is a commodity steeler malware that can collect system metadata, receive tasks from a command and control (C2) server, and receive perspective data of interest from infected hosts. Exfiltration targets include cryptocurrency wallets, web browsers, password managers, FTP clients, and messaging apps.

“These targets may be changed because they can be configured by the C2 operator,” explained Elastic. “Eddiestealer uses standard kernel32.dll functions such as createfilew, getfilesizeex, readfile, and closehandle to read the target file.”

Cybersecurity

The collected host information is encrypted in a separate HTTP POST request after each task is completed and sent to the C2 server.

In addition to incorporating string encryption, the malware employs a custom WinAPI lookup mechanism to resolve API calls, creating Mutexes to ensure that only one version is running at any time. It also determines whether it is running in a sandboxed environment with built-in checks and, if so, removes it from disk.

“Based on similar self-exclusion techniques observed in Latrodectus, Eddiestealer can be removed via renaming NTFS alternative data streams to bypass file locks,” Elastic said.

Another notable feature built into Steeler is that it allows you to bypass chrome app-bound encryption to access unencrypted sensitive data such as cookies. This is achieved by including a Rust implementation of Chromekatz. Chromekatz is an open source tool that allows you to dump cookies and credentials from memory in a Chromium-based browser.

The Rust version of Chromekatz also includes changes to handle scenarios where the targeted Chromium browser is not running. In such cases, a new browser instance is generated using the command line argument “-window-position = -3000, -3000 https://google.com”.

When you open the browser, the purpose is to be able to read the memory associated with a child process of a Chrome network service identified by “-utility-sub-type = network.mojom.networkservice”.

Elastic said he also identified an updated version of the malware with the ability to harvest the running process, GPU information, CPU core count, CPU name, and CPU vendor. Additionally, the new variant fine-tunes the C2 communication pattern by preemptively sending host information to the server before receiving the task configuration.

That’s not all. The encryption key used for client-to-client communication is hardcoded into binary rather than dynamically retrieved from the server. Additionally, it is known that steelers launch new Chrome processes using -remote-debugging-port=flag to enable the DevTools protocol on the local websocket interface to interact with the browser without the need for user interaction.

“This adoption of rust in malware development reflects the growth trends of threat actors seeking to leverage modern language capabilities to improve stealth, stability and resilience over traditional analytical workflows and threat detection engines,” the company said.

This disclosure comes when C/Side reveals details about a ClickFix campaign targeting multiple platforms, including Apple MacOS, Android, and iOS, using techniques such as browser-based redirection, fake UI prompts, and drive-by download techniques.

The attack chain starts with obfuscated JavaScript hosted on a website. This leads to a download of steeler malware that, when visited from MacOS, initiates a series of redirects to pages that guide the victim to launch the terminal and run the shell script, flagging Virustotal as Atomic Macauzear (AMOS).

However, the same campaign is set up to launch a drive-by download scheme when accessing a web page from an Android, iOS or Windows device, leading to the deployment of another Trojan malware.

Cybersecurity

According to Nextron and Kandji, disclosures coincide with the emergence of new steeler families such as Katz Stealer and AppleProcesshub Stealer and AppleProcesshub Stealer respectively, allowing a wide range of information to be harvested from infected hosts.

Katz Stealer, like Eddiestealer, is designed to avoid app-bound encryption in Chrome, but is designed differently by using DLL injection to obtain an encryption key without administrator privileges and using it to decrypt encrypted cookies and passwords from Chromium-based browsers.

“Attackers hide malicious JavaScript in GZIP files, which triggers the download of PowerShell scripts when opened,” says Nextron. “This script gets a .NET-based loader payload, which injects the steeler into a legitimate process. When active, it removes stolen data to the command and control server.”

Meanwhile, AppleProcesshub Stealer is designed to remove user files such as Bash History, ZSH History, GitHub configuration, SSH information, iCloud keychain, and more.

The attack sequence that distributes the malware involves the use of MACH-O binary to download the second stage Bash Stealer script from the server “AppleProcesshub”[.]com” will return the result to the C2 server. Details about the malware were first shared on May 15, 2025 by Malwarehunterteam and last week by Macpaw’s Moonlock Lab.

“This is an example of MACH-O written in Objective-C, which communicates with commands and control servers to run scripts,” said Christopher Lopez, a researcher at Kandji.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Articlezircuit allows for top-up of non-curative wallets for crypto.com visa cards
Next Article Gemini automatically summarises long emails unless you opt out
user
  • Website

Related Posts

New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora

May 31, 2025

US DOJ seizes four domains that support cybercrime crypto services in global operations

May 31, 2025

China-linked hackers exploit SAP and SQL server flaws in Asian and Brazilian attacks

May 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Things AI can do, but laws won’t allow: 16 profitable AI ideas big tech won’t touch (but you can)

California’s Track and Field Finals begin to follow the controversy over trans athletes

Saudi Arabia says it will fund Syrian salaries in jointly with Qatar | Syrian War News

India’s top general admits “loss” in the air in recent conflict with Pakistan | India and Pakistan tension news

Trending Posts

Saudi Arabia says it will fund Syrian salaries in jointly with Qatar | Syrian War News

May 31, 2025

India’s top general admits “loss” in the air in recent conflict with Pakistan | India and Pakistan tension news

May 31, 2025

Iran will increase its stockpile of enriched uranium by 50%, the IAEA says | Nuclear Weapons News

May 31, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Things AI can do, but laws won’t allow: 16 profitable AI ideas big tech won’t touch (but you can)

Top Startup and Tech Funding News for the Week Ending May 30, 2025

Where LLMS retrieves real-time data behind AI searches (and why it’s more important than you think)

SpaceX’s Journey to Mars: How Spaceships Use Hohmann Orbital’s Movement from Earth to Mars (and the Physics Behind)

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.