Beware: Faux Google Meet Pages Ship Infostealers in Ongoing ClickFix Marketing campaign

Oct 18, 2024Ravie LakshmananMenace Intelligence / Phishing Assault

Menace actors are leveraging faux Google Meet internet pages as a part of an ongoing malware marketing campaign dubbed ClickFix to ship infostealers concentrating on Home windows and macOS methods.

“This tactic involves displaying fake error messages in web browsers to deceive users into copying and executing a given malicious PowerShell code, finally infecting their systems,” French cybersecurity firm Sekoia mentioned in a report shared with The Hacker Information.

Variations of the ClickFix (aka ClearFake and OneDrive Pastejacking) marketing campaign have been reported extensively in latest months, with risk actors using completely different lures to redirect customers to bogus pages that intention to deploy malware by urging website guests to run an encoded PowerShell code to deal with a supposed challenge with displaying content material within the internet browser.

Cybersecurity

These pages are recognized to masquerade as well-liked on-line companies, together with Fb, Google Chrome, PDFSimpli, and reCAPTCHA, and now Google Meet in addition to probably Zoom –

  • meet.google.us-join[.]com
  • meet.googie.com-join[.]us
  • meet.google.com-join[.]us
  • meet.google.web-join[.]com
  • meet.google.webjoining[.]com
  • meet.google.cdm-join[.]us
  • meet.google.us07host[.]com
  • googiedrivers[.]com
  • us01web-zoom[.]us
  • us002webzoom[.]us
  • web05-zoom[.]us
  • webroom-zoom[.]us

On Home windows, the assault chain culminates within the deployment of StealC and Rhadamanthys stealers, whereas Apple macOS customers are served a booby-trapped disk picture file (“Launcher_v1.94.dmg”) that drops one other stealer often called Atomic.

This rising social engineering tactic is notable for the truth that it cleverly evades detection by safety instruments, because it entails the customers manually operating the malicious PowerShell command instantly on the terminal, versus being routinely invoked by a payload downloaded and executed by them.

Fake Google Meet

Sekoia has attributed the cluster impersonating Google Meet to 2 traffers teams, particularly Slavic Nation Empire (aka Slavice Nation Land) and Scamquerteo, that are sub-teams inside markopolo and CryptoLove, respectively.

“Both traffers teams […] use the same ClickFix template that impersonates Google Meet,” Sekoia mentioned. “This discovery suggests that these teams share materials, also known as ‘landing project,’ as well as infrastructure.”

This, in flip, has raised the chance that each the risk teams are making use of the identical, as-yet-unknown cybercrime service, with a third-party probably managing their infrastructure.

Cybersecurity

The event comes amid the emergence of malware campaigns distributing the open-source ThunderKitty stealer, which shares overlaps with Skuld and Kematian Stealer, in addition to new stealer households named Disclose, DedSec (aka Doenerium), Duck, Vilsa, and Yunit.

“The rise of open-source infostealers represents a significant shift in the world of cyber threats,” cybersecurity firm Hudson Rock famous again in July 2024.

“By lowering the barrier of entry and fostering rapid innovation, these tools could fuel a new wave of computer infections, posing challenges for cybersecurity professionals and increasing the overall risk to businesses and individuals.”

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.

Recent articles

INTERPOL Pushes for

Dec 18, 2024Ravie LakshmananCyber Fraud / Social engineering INTERPOL is...

Patch Alert: Essential Apache Struts Flaw Discovered, Exploitation Makes an attempt Detected

Dec 18, 2024Ravie LakshmananCyber Assault / Vulnerability Risk actors are...