Skip to main content

 

A new malicious campaign tricks people by pretending to be Google Chrome, Word, or OneDrive errors. They use these fake alerts to convince users to run harmful PowerShell "fixes" that actually install malware.

This campaign involves several cyber threat groups, including ClearFake and others like ClickFix and TA571. ClearFake has previously used tricks where websites ask users to update their browser, but the update actually installs malware.

In the latest attacks, cybercriminals use JavaScript in email attachments or hacked websites. They show fake error messages that look like they're from Google Chrome, Word, or OneDrive. These messages tell users to click a button to copy a PowerShell "fix" onto their computer. They're then told to run this script in a special Windows tool called PowerShell.

Even though these attacks need users to do several things to work, the trickery is clever enough to make people think there's a real problem that needs fixing. This might make users act quickly without thinking about the dangers, according to a report from ProofPoint.

The malware that ProofPoint found includes DarkGate, Matanbuchus, NetSupport, Amadey Loader, XMRig, a tool that steals from clipboards, and Lumma Stealer.

ProofPoint experts saw three types of attacks, each starting differently. Only the first one isn't clearly linked to TA571. In this case, linked to ClearFake, users visit a website that's been tampered with. It loads a bad script from the blockchain using Binance's Smart Chain contracts.

This script checks things and then shows a false warning from Google Chrome. It says there's a problem showing a web page. The message asks the visitor to install a "root certificate." They do this by copying a PowerShell script to their Windows Clipboard and running it in a special version of PowerShell made for administrators.


Fake Google Chrome error
Source: Proofpoint

When the PowerShell script is executed, it will perform various steps to confirm the device is a valid target, and then it will download additional payloads, as outlined below.

·         Flushes the DNS cache.

·         Removes clipboard content.

·         Displays a decoy message.

Downloads another remote PowerShell script, which performs anti-VM checks before downloading an info-stealer.

The 'ClearFake' attack chain
Source: Proofpoint

The second way attackers operate is linked to the 'ClickFix' plan. They modify websites that have been hacked. This change puts a frame over a fake Google Chrome error message.

People are told to open "Windows PowerShell (Admin)" and paste in the code given. This leads to the same bad programs as mentioned before.

Next, an email attack uses HTML attachments that look like Microsoft Word files. It asks users to add the "Word Online" extension to view the document correctly.

The error message gives options like "How to fix" and "Auto-fix". Choosing "How to fix" copies a special code to the computer's clipboard. It tells the user to paste this into PowerShell.

"Auto-fix" uses a special protocol called search-ms to show a file from the internet. This file is on a remote computer controlled by the attacker. It could be named "fix.msi" or "fix.vbs".

Fake Microsoft Word error leads to malware
Source: Proofpoint

In these situations, the PowerShell commands download and run either an MSI file or a VBS script. This results in infections by Matanbuchus or DarkGate.

In all situations, the attackers rely on the fact that people may not realize the dangers of running PowerShell commands on their computers.

They also use the fact that Windows doesn't always catch and stop the harmful actions started by the pasted code.

These various attack methods demonstrate that TA571 is trying out different ways to be more effective and discover more ways to infect more computers.







Popular posts from this blog

Unlock Your Potential with Google Gemini: Where Innovation Meets Intelligence.

  Google is launching a new artificial intelligence application named Gemini, which will offer users the ability to rely on technology for various tasks such as writing, interpreting text, and more, rather than solely relying on their own cognitive abilities. Gemini, named after a previously introduced AI project, is replacing Google's earlier brand, Bard. Bard, initially developed as a Chatbot to compete with Microsoft's ChatGPT-4, is now being rebranded as Gemini, signifying Google's most advanced family of AI models. The Gemini app will be available for smart phones running on Android as well as on the web, with immediate release. The introduction of Gemini intensifies the competition between Google and Microsoft in the realm of AI tools, which are promoted as offering innovative ways for users to enhance creativity, manage tasks like debugging code, and prepare for job interviews. While a basic version of Gemini is offered for free, Google is also introducing a ...

What is Sora ?

Similar to Dall-E, which utilizes text prompts to generate images, Sora employs text prompts to produce brief videos. Sora has the capacity to create videos lasting up to one minute, solely based on a straightforward prompt. According to the site's blog, "Sora can generate videos up to a minute long while preserving visual quality and adhering to the user’s prompt." The AI model is capable of animating a static image into a video presentation. "Its capability extends to transforming a still image into a video, bringing the image’s elements to life with precision and attention to minute details," it elaborated. Additionally, Sora can elongate existing videos or fill in gaps by generating missing frames. Here's a brief overview of how it functions: 1. Provide a written prompt outlining your requirements. 2. The AI model will craft a video (maximum duration: 1 minute). 3. For longer videos, you can supplement the prompts and synchronize them with frame counts. ...

Bianca Devins: A Tragic Tale of Online Deception and Violence

                      The digital world can be a double-edged sword, offering connections and friendships while hiding darker dangers beneath its surface. Seventeen-year-old Bianca Devins, a resident of New York, sought solace in online communities like 4chan and Discord, searching for companionship in a world where she felt like an outsider. However, her quest for friendship led her down a perilous path that ultimately ended in tragedy.   As one of the few women in these predominantly male spaces, Bianca quickly gained attention, earning a reputation as an 'e-girl,' a term referring to a specific electronic aesthetic. Yet, behind the allure of online popularity lurked a sinister reality. Bianca and her friend Claire shared experiences of encountering older abusive men on 4chan, highlighting the dangers that lurked within these seemingly innocuous online spaces.   One such individual was Brandon Andrew Clark, a 21-...