{"id":25607,"date":"2024-12-19T15:10:03","date_gmt":"2024-12-19T23:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/12\/19\/news-19336\/"},"modified":"2024-12-19T15:10:03","modified_gmt":"2024-12-19T23:10:03","slug":"news-19336","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/12\/19\/news-19336\/","title":{"rendered":"&#8216;Fix It&#8217; social-engineering scheme impersonates several brands"},"content":{"rendered":"\n<p>More and more, threat actors are leveraging the browser to deliver malware in ways that can evade detection from antivirus programs. Social engineering is a core part of these schemes and the tricks we see are sometimes very clever.<\/p>\n<p>Case in point, there has been an increase in attacks that involve copying a malicious command into the clipboard, only to be later pasted and executed by the victims themselves. Who would have though that copy\/paste could be so dangerous?<\/p>\n<p>The new campaign we observed uses a a combination of malicious ads and decoy pages for software brands, followed by a fake Cloudflare notification that instructs users to manually run a few key combinations. Unbeknownst to them, they are actually executing PowerShell code that retrieves and installs malware.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-the-discovery\">The discovery<\/h2>\n<p>Our investigation into this campaign started from a suspicious ad for &#8216;notepad&#8217; while performing a Google search. Such search queries have been a hot spot for criminals who want to lure victims that are looking to download programs onto their computer.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_d32618.png\"><img decoding=\"async\" loading=\"lazy\" width=\"582\" height=\"276\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_d32618.png\" alt=\"\" class=\"wp-image-146554\" \/><\/a><\/figure>\n<p>Based on previous evidence, criminals are tricking victims into visiting a lookalike site with the goal of downloading malware. In this case, the first part was true, but what unfolded next was new to us.<\/p>\n<p>When we clicked the Download button, we were redirected to a new page that appeared to be Cloudflare asking us to &#8220;<em>verify you are human by completing the action below<\/em>&#8220;. This type of message is more and more common, as site owners try to prevent bots and other unwanted traffic.<\/p>\n<p>But rather than having to solve a CAPTCHA, we saw another unexpected message: <em>&#8220;Your browser does not support correct offline display of this document. Please follow the instructions below using the &#8220;Fix it&#8221; button<\/em>&#8220;.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/fixit2.gif\"><img decoding=\"async\" loading=\"lazy\" width=\"774\" height=\"722\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/fixit2.gif\" alt=\"\" class=\"wp-image-146552\" \/><\/a><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-powerful-technique\">Powerful technique<\/h2>\n<p>This technique is actually not new in itself, and similar variants have been seen both via email spam and compromised websites before. It is sometimes referred to as <a href=\"https:\/\/rmceoin.github.io\/malware-analysis\/2024\/05\/07\/clearfake2.html\">ClearFake<\/a> or <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/security-brief-clickfix-social-engineering-technique-floods-threat-landscape\">ClickFix<\/a>, and requires users to perform a manual action to execute a malicious PowerShell command.<\/p>\n<p>Clicking on the &#8216;Fix It&#8217; button copies that command into memory (the machine&#8217;s clipboard). Of course the user has no idea what it is, and may follow the instructions that ask to press the Windows and &#8216;R&#8217; key to open the Run command dialog. CTRL+V pastes that command and Enter executes it.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_4a0264.png\"><img decoding=\"async\" loading=\"lazy\" width=\"854\" height=\"787\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_4a0264.png\" alt=\"\" class=\"wp-image-146576\" \/><\/a><\/figure>\n<p>Once the code runs, it will download a file from a remote domain (<em>topsportracing[.]com<\/em>) within the script. We tested that payload in a sandbox and observed immediate fingerprinting:<\/p>\n<pre class=\"wp-block-preformatted\">C:UsersAdminAppDataLocalTemp10.exe<br>    C:WindowsSYSTEM32systeminfo.exe<br>        C:Windowssystem32cmd.exe<br>            C:Windowssystem32cmd.exe \/c \"wmic computersystem get manufacturer\"<\/pre>\n<p>The information is then sent back to a command and control server (<em>peter-secrets-diana-yukon[.]trycloudflare[.]com<\/em>) abusing Cloudflare tunnels:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_465ef6.png\"><img decoding=\"async\" loading=\"lazy\" width=\"688\" height=\"670\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_465ef6.png\" alt=\"\" class=\"wp-image-146581\" \/><\/a><\/figure>\n<p>The use of Cloudflare tunnels by criminals was previously <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/threat-actor-abuses-cloudflare-tunnels-deliver-rats\">reported<\/a> by Proofpoint to deliver RATs. We weren&#8217;t able to observe a final payload but it is likely of a similar kind, perhaps an infostealer.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-campaign-targets-several-brands\">Campaign targets several brands<\/h2>\n<p>This was not an isolated campaign for Notepad, as we soon found additional sites with a similar lure. There was a Microsoft Teams landing page which used exactly the same trick, followed by others such as FileZilla, UltraViewer, CutePDF and Advanced IP Scanner.<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_f617bb.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1361\" height=\"1035\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_f617bb.png?w=1024\" alt=\"\" class=\"wp-image-146567\" \/><\/a><\/figure>\n<figure class=\"wp-block-image aligncenter size-large\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_0f8fa6.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1361\" height=\"1036\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_0f8fa6.png?w=1024\" alt=\"\" class=\"wp-image-146568\" \/><\/a><\/figure>\n<figure class=\"wp-block-image aligncenter size-large\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_bde12d.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1361\" height=\"1035\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_bde12d.png?w=1024\" alt=\"\" class=\"wp-image-146569\" \/><\/a><\/figure>\n<figure class=\"wp-block-image aligncenter size-large\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_470eb7.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1361\" height=\"1036\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_470eb7.png?w=1024\" alt=\"\" class=\"wp-image-146587\" \/><\/a><\/figure>\n<figure class=\"wp-block-image aligncenter size-large\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_efa8e7.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1363\" height=\"1037\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_efa8e7.png?w=1024\" alt=\"\" class=\"wp-image-146604\" \/><\/a><\/figure>\n<figure class=\"wp-block-image aligncenter size-large\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_3359bf.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1210\" height=\"914\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_3359bf.png?w=1024\" alt=\"\" class=\"wp-image-146794\" \/><\/a><\/figure>\n<p>Oddly, we saw a lure for a cruise booking site. We have no idea how that came to be, unless the criminals agree that everyone needs a vacation sometimes.<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_7bfacc.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1362\" height=\"1036\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_7bfacc.png?w=1024\" alt=\"\" class=\"wp-image-146603\" \/><\/a><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-overlap-with-other-campaigns\">Overlap with other campaigns<\/h2>\n<p>As mentioned previously, this type of social engineering attack is getting more and more popular. Researchers are <a href=\"https:\/\/infosec.exchange\/@monitorsg\">tracking<\/a> several different families under different names such as the original <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/12\/malicious-ad-distributes-socgholish-malware-to-kaiser-permanente-employees\">SocGholish<\/a>.<\/p>\n<p>Interestingly, the same domain (<em>topsportracing[.]com<\/em>) we saw in the malicious PowerShell command for Notepad++ was also used recently in another campaign known as <a href=\"https:\/\/infosec.exchange\/tags\/KongTuke\">#KongTuke<\/a>:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_a487ad.png\"><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"541\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_a487ad.png\" alt=\"\" class=\"wp-image-146725\" \/><\/a><\/figure>\n<p>As these schemes are being increasingly used by criminals, it is important to be aware of the processes involved. The Windows key and the letter &#8216;R&#8217; pressed together open the Run dialog box. This is not something that most users will ever need to do, so always think carefully whenever you are instructed to perform this.<\/p>\n<p>Malwarebytes customers are protected against this attack via our web protection engine for both the malicious sites and PowerShell command.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_ab6f07.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1001\" height=\"708\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/12\/image_ab6f07.png\" alt=\"\" class=\"wp-image-146815\" \/><\/a><\/figure>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on threats\u2014we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-indicators-of-compromise\">Indicators of Compromise<\/h2>\n<p>Malicious domains<\/p>\n<pre class=\"wp-block-preformatted\">notepad-plus-plus.bonuscos[.]com<br>microsoft.team-chaats[.]com<br>cute-pdf[.]com<br>ultra-viewer[.]com<br>globalnetprotect[.]com<br>sunsetsailcruises[.]com<br>jam-softwere[.]com<br>advanceipscaner[.]com<br>filezila-project[.]com<br>vape-wholesale-usa[.]com<\/pre>\n<p>Servers used before Cloudflare proxy<\/p>\n<pre class=\"wp-block-preformatted\">185.106.94[.]190<br>89.31.143[.]90<br>94.156.177[.]6<br>141.8.192[.]93<\/pre>\n<p>Malware download URLs<\/p>\n<pre class=\"wp-block-preformatted\">hxxp[:\/\/]topsportracing[.]com\/wpnot21<br>hxxp[:\/\/]topsportracing[.]com\/wp-s2<br>hxxp[:\/\/]topsportracing[.]com\/wp-s3<br>hxxp[:\/\/]topsportracing[.]com\/wp-25<br>hxxp[:\/\/]chessive[.]com\/10[.]exe<br>hxxp[:\/\/]212[.]34[.]130[.]110\/1[.]e<\/pre>\n<p>Malware C2<\/p>\n<pre class=\"wp-block-preformatted\">peter-secrets-diana-yukon[.]trycloudflare[.]com<\/pre>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/cybercrime\/2024\/12\/fix-it-social-engineering-scheme-impersonates-several-brands\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Criminals are luring victims looking to download software and tricking them into running a malicious command. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[32254,11458,4503,10531,3764,11191],"class_list":["post-25607","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-clickfix","tag-cloudflare","tag-cybercrime","tag-malvertising","tag-malware","tag-powershell"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25607"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25607\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}