⚠️ New #ClickFix malware campaign is tricking users with a fake browser “fix” prompt that leads to #DarkGate being installed via clipboard PowerShell commands. 📋

Read: https://hackread.com/clickfix-attack-fake-browser-install-darkgate-malware/

#CyberSecurity #Malware #Windows #Scam #InfoSec

New ClickFix Attack Uses Fake Browser Fix to Install DarkGate Malware

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

#ClickFix went from virtually non-existent to the second most common attack vector blocked by #ESET, surpassed only by #phishing. This novel social engineering technique accounted for nearly 8% of all detections in H1 2025. #ESETresearch
ClickFix lures users by displaying bogus error messages followed by quick fix instructions, including copy-pasting malicious code. Running the code in the victim’s command line interpreter delivers malware such as #RATs, infostealers, and cryptominers.
Between H2 2024 and H1 2025, ESET’s detection for ClickFix, HTML/FakeCaptcha, skyrocketed by 517%. Most detections in ESET telemetry were reported from Japan (23%), Peru (6%), and Poland, Spain, and Slovakia (>5% each).
What makes #ClickFix so effective? The fake error message looks convincing; instructions are simple, yet the copied command is too technical for most users to understand. Pasting it into cmd leads to compromise with final payloads, including #DarkGate or #LummaStealer.
While #ClickFix was introduced by cybercriminals, it’s since been adopted by APT groups: Kimsuky, Lazarus; Callisto, Sednit; MuddyWater; APT36. NK-aligned actors used it to target developers, steal crypto and passwords from Metamask and #macOS Keychain.
#ClickFix uses psychological manipulation by presenting fake issues and offering quick solutions, which makes it dangerously efficient. It appears in many forms – error popups, email attachments, fake reCAPTCHAs – highlighting the need for greater vigilance online.
Read more in the #ESETThreatReport:
🔗 https://welivesecurity.com/en/eset-research/eset-threat-report-h1-2025
Cybercriminelen misbruiken microsoft teams en anydesk voor malware-aanvallen

Recentelijk zijn cybercriminelen betrapt op het misbruiken van populaire software zoals Microsoft Teams en AnyDesk om gevaarlijke malware te verspreiden. Dit a

Tech Nieuws
DarkGate Malware Distributed Through Microsoft Teams Vishing Attack - RedPacket Security

A threat actor has been observed utilizing vishing through Microsoft Teams as a method to distribute DarkGate malware, allowing them to take remote control

RedPacket Security

Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware https://thehackernews.com/2024/12/attackers-exploit-microsoft-teams-and.html

#DarkGate #Malware #CyberSec

Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware

Attackers exploit Microsoft Teams calls to deploy DarkGate malware via AnyDesk. Security measures urged.

The Hacker News

A new malicious campaign uses impersonation via Microsoft Teams voice phishing (vishing), tricking the victims into downloading AnyDesk for remote access and deploying #DarkGate malware.

https://socprime.com/blog/darkgate-malware-detection/?utm_source=mastodon&utm_medium=social&utm_campaign=cert-ua&utm_content=blog-post

DarkGate Malware Attack Detection: Voice Phishing via Microsoft Teams Leads to Malware Distribution - SOC Prime

Detect DarkGate malware deployed via Microsoft Teams voice phishing using a set of dedicated Sigma rules from SOC Prime Platform.

SOC Prime
📬 Keylogger versteckte sich in Erweiterung von Pidgin
#Cyberangriffe #Darkgate #Eset #Jabber #Keylogger #Pidgin https://sc.tarnkappe.info/b4019a
Keylogger versteckte sich in Erweiterung von Pidgin

Eine schädliche Erweiterung des Messengers Pidgin versteckte sich für fast sechs Wochen in einem offiziell zum Download angebotenen Plug-in.

Tarnkappe.info
#Malware infiltrates #Pidgin messenger’s official plugin repository https://www.bleepingcomputer.com/news/security/malware-infiltrates-pidgin-messengers-official-plugin-repository/ I used to use Pidgin to communicate with friends on AIM and similar messenger apps. The malicious plugin was offered only as a binary, not open source code. Worryingly, it had valid signatures, and so did the malware it downloaded. #DarkGate #Jabber #messenger
Malware infiltrates Pidgin messenger’s official plugin repository

The Pidgin messaging app removed the ScreenShareOTR plugin from its official third-party plugin list after it was discovered that it was used to install keyloggers, information stealers, and malware commonly used to gain initial access to corporate networks.

BleepingComputer
Malware infiltrates Pidgin messenger’s official plugin repository

The Pidgin messaging app removed the ScreenShareOTR plugin from its official third-party plugin list after it was discovered that it was used to install keyloggers, information stealers, and malware commonly used to gain initial access to corporate networks.

BleepingComputer
DarkGate: Dancing the Samba With Alluring Excel Files
#DarkGate
https://unit42.paloaltonetworks.com/darkgate-malware-uses-excel-files/
DarkGate: Dancing the Samba With Alluring Excel Files

We perform an in-depth study of a DarkGate malware campaign exploiting Excel files from early this year, assessing its functionality and its C2 traffic.

Unit 42