Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

Whitehouse is already one of the most blocked accounts on Bluesky

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » The new filefix variant delivers stealc malware through multilingual phishing sites
Identity

The new filefix variant delivers stealc malware through multilingual phishing sites

userBy userSeptember 16, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 16, 2025Ravi LakshmananMalware/Social Engineering

Cybersecurity researchers are warning about new campaigns that are leveraging variants of FileFix social engineering tactics to provide STEALC information steeler malware.

“The observed campaign uses highly compelling multilingual phishing sites (e.g., fake Facebook security pages) and avoid detection with anti-analytics technology and advanced obfuscation,” Acronis security researcher Eliad Kimhy said in a report shared with Hacker News.

At high levels, the attack chain uses FileFix to seduce users to launch the initial payload and download seemingly harmless images containing malicious components from the BitBucket repository. This allows attackers to bypass detection by abusing the trust associated with legitimate source code hosting platforms.

FileFix is ​​a bit different from Clickfix, as it was first documented as a proof of concept (POC) by security researcher MRD0X in June 2025. This avoids the need to launch the Windows Run dialog and paste the already copied OBFuscated command to complete the Bogs Captcha verification check on the polished page set for this purpose.

Audit and subsequent

Instead, it leverages the file upload feature of a web browser to deceive users, copy and paste copies into the File Explorer address bar, and runs locally on the victim’s machine.

The attack begins on a phishing site where victims are likely to be redirected from an email message warning recipients about potential suspensions of their Facebook accounts a week later, claiming that the shared post or message violates the policy. Users are then asked to click on a button to appeal to the decision.

Not only is phishing pages obfuscated in large quantities, they also rely on techniques such as junk code and fragmentation, which hinders analysis efforts.

File fix attacks take effect when you click the button. At this point you will see a message that you can copy and paste the path to the document in the File Explorer address bar to access the expected policy violation PDF version.

The path provided in the order looks completely harmless,[コピー]When you click the button, it actually copies malicious commands with extra spaces, so when you open it using the Open File Explorer button, only the file path will be displayed when pasted into File Explorer.

This command is a multi-stage PowerShell script that downloads the aforementioned image and decodes it into the next stage payload, and runs a GO-based loader that unpacks the shellcode responsible for launching STEALC.

FileFix also offers an important advantage over ClickFix. This could potentially block system administrators as security majors[Runダイアログ(またはAppleMacOSの場合のターミナルアプリ)を開くのではなく、広く使用されているブラウザー機能を乱用するためです。

「一方、Clickfixをそもそも検出するのが非常に難しいことの1つは、実行ダイアログを介してExplorer.exeから、または端末から直接生み出されることです。

「この攻撃の背後にある敵は、貿易財産への多大な投資を示し、フィッシングインフラストラクチャ、ペイロード配信、およびサポート要素を慎重に工学的に設計して、回避と衝撃の両方を最大化しました。」

この開示は、Doppelが偽のサポートポータル、CloudFlare Captchaエラーページ、クリップボードハイジャック(つまり、Clickfix)の組み合わせを使用して、Autohotkey(AHK)をダウンロードして実行する悪意のあるPowerShellコードを実行するために、Clipboard Hijacking(Ie、Clickfix)を使用して別のキャンペーンを詳述したことに伴います。

CISビルドキット

このスクリプトは、侵害されたホストをプロファイルし、AnyDesk、TeamViewer、Information Stealers、Clipper Malwareなどの追加のペイロードを提供するように設計されています。

サイバーセキュリティ会社は、犠牲者が見た目のようなGoogleドメインを指すMSHTAコマンドを実行するように導かれる活動の他のバリアントも観察したと述べました( “wl.google-587262[.]com”), retrieve and run a remote malicious script.

“AHK is a Windows-based scripting language originally designed to automate repetitive tasks such as keystrokes and mouse clicks,” said Aarsh Jawa, security researcher at Doppel.

“Though it has long been popular among power users and system administrators because of its simplicity and flexibility, threat actors began to create lightweight malware droppers and information steelers using AHK as weapons around 2019. These malicious scripts often pose as benign automation tools or support utilities.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleyCombinator Support Rule Base wants to be a Fintech AI colleague
Next Article Google launches a new protocol for agent-driven purchases
user
  • Website

Related Posts

Europol dismantles SIM farm network running 49 million fake accounts worldwide

October 19, 2025

New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs

October 18, 2025

Silver Fox spreads Winos 4.0 attack to Japan and Malaysia via HoldingHands RAT

October 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

Whitehouse is already one of the most blocked accounts on Bluesky

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Wikipedia says AI search summaries and social videos are causing traffic decline

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.