In May 2024, a new social engineering tactic called ClickFix emerged, featuring a ClearFake cluster that the Sekoia Threat Detection & Research (TDR) team closely monitored and analysed in a private report entitled FLINT 2024-027 – New widespread ClearFake variant abuses PowerShell and clipboard. This tactic involves displaying fake error messages in web browsers to deceive users into copying and executing a given malicious PowerShell code, finally infecting their systems.
Proofpoint researchers, who named this tactic ClickFix, reported1 that the initial access broker TA571 leveraged it in email phishing campaigns since March 2024. These campaigns primarily used HTML files disguised as Word documents, displaying a fake error window that prompts users to install malware such as Matanbuchus, DarkGate, or NetSupport RAT via a PowerShell script.
In recent months, multiple malware distribution campaigns have leveraged the ClickFix lure to spread Windows and macOS infostealers, botnets, and remote access tools. This is in line with the growing, ongoing trend of distributing malware through the drive-by download technique. Sekoia analysts assess that several intrusion sets recently adopted this tactic, presumably to evade antivirus software scanning and browser security features, aiming to improve attackers’ infection rates.
In this blog post, we provide a chronological overview of the observed ClickFix campaigns. We further share technical details about a ClickFix cluster that uses fake Google Meet video conference pages to distribute infostealers, targeting both Windows and macOS systems. Sekoia analysts successfully associated this cluster impersonating Google Meet with two cybercrime groups: “Slavic Nation Empire (SNE)” and “Scamquerteo“. These groups are sub-teams of the cryptocurrency scam teams “Marko Polo” and “CryptoLove“, respectively.
Since June 2024, various open source reports and Sekoia investigations have revealed malware distribution campaigns using the emerging ClickFix tactic. The following figure provides a chronological overview of these campaigns. It highlights the malware families involved and the distribution techniques used, which include phishing emails, compromised websites, and distribution infrastructures.
Here are some examples of malicious websites that impersonate Google Chrome, Facebook, PDFSimpli, and reCAPTCHA, using the ClickFix social engineering tactic.
While many of these campaigns reportedly aim to broadly target multiple sectors – using websites compromised by ClearFake or through extensive phishing efforts – some are designed to target specific verticals.
For instance, Proofpoint identified2 a ClickFix cluster targeting transport and logistics companies in North America from at least May to August 2024. This campaign uses websites that impersonate transport and fleet operations management software.
Additionally, the GitHub issues campaign mainly targeted developers to spread Lumma Stealer by falsely reporting security vulnerabilities, thereby impacting thousands of public code repositories and exploiting developers’ trust in GitHub notifications. The goal of this large-scale operation was likely to opportunistically gather a significant amount of sensitive developer data, which can be used for more targeted attacks in the future.
Recent campaigns uncovered by Sekoia analysts appear to continuously target both businesses and individuals, using opportunistic lures such as fake Google Meet pages and Facebook groups.
The following section provides a detailed analysis of one of the clusters discovered by Sekoia analysts.
By pivoting on the text elements in ClickFix messages displayed to users, such as the phrase “Press the key combination” or “CTRL+V”, we discovered several websites masquerading as the homepage of a Google Meet video conference. The sites displayed pop-up windows falsely indicating problems with the microphone and headset, as shown on the figure below.
We identified the following domain names and IP address that we attribute to this cluster with high confidence:
The phishing URLs imitate legitimate ones with the same pattern for the meeting identifier, e.g.:
For Windows users, clicking on the “Try Fix” button results in copying the following command into the clipboard:
The fix-error file (SHA256: 92a8cc4e385f170db300de8d423686eeeec72a32475a9356d967bee9e3453138) is an HTML file containing an HTML Application (HTA) which itself contains an obfuscated VBScript. Using a Python script3, we deobfuscated it and obtained the following VBScript.
Upon execution, the VBS script performs the following actions:
The two executables stealc.exe (SHA256: a834be6d2bec10f39019606451b507742b7e87ac8d19dc0643ae58df183f773c) and ram.exe (SHA256: 2853a61188b4446be57543858adcc704e8534326d4d84ac44a60743b1a44cbfe) are the Stealc and Rhadamanthys payloads respectively, both protected by the HijackLoader crypter.
In this campaign, the Stealc C2 server is “hxxp://95.182.97[.]58/84b7b6f977dd1c65.php” and the Rhadamanthys C2 server is “hxxp://91.103.140[.]200:9078/3936a074a2f65761a5eb8/6fmfpmi7.fwf4p”. Both IP addresses were already known by our CTI database following the Sekoia.io C2 Trackers monitoring routine, as we proactively track the C2 infrastructure of these two infostealer families sold as Malware-as-a-Service.
Notably, the name of the Stealc botnet “sneprivate24” suggests that the traffer4 group “Slavic Nation Empire (SNE)” was behind this campaign. Further details about this association can be found in the section “Traffers teams operating this ClickFix cluster”.
For macOS users, clicking on the “Try Fix” button results in downloading the file Launcher_v1.94.dmg (SHA256: 94379fa0a97cc2ecd8d5514d0b46c65b0d46ff9bb8d5a4a29cf55a473da550d5), using the following HTTP requests:
We identified the payload Launcher_v1.94.dmg (SHA256: 94379fa0a97cc2ecd8d5514d0b46c65b0d46ff9bb8d5a4a29cf55a473da550d5) as AMOS Stealer, which communicates with its C2 server at “hxxp://85.209.11[.]155/joinsystem”.
Sekoia actively tracks this infrastructure characterised by the /kusaka.php endpoint. Since at least May 2024, this endpoint is used in campaigns redirecting users from malicious websites to download the AMOS Stealer. It is likely used to protect the payload from unwanted traffic, such as downloads by bots or scans by security products.
We identified the following domain names associated with this macOS malware distribution infrastructure:
Given the variety of initial malicious websites redirecting to this infrastructure, we assess with high confidence that it is shared among multiple threat actors. They collaborate within a centralised traffers team to share certain resources, including this infrastructure and the AMOS Stealer, which is also sold as Malware-as-a-Service.
The attacker’s server hosts an interesting JavaScript code at hxxp://77.221.157[.]170:3004/server.js5, which is a backend code related to this distribution infrastructure. In brief, this JavaScript connects to a MongoDB database to retrieve worker’s information, and sends statistics to two Telegram bots when users visited the malicious Google Meet websites and successfully downloaded the payload. We would like to thank the cybersecurity researcher Karol Paciorek from the CSIRT KNF team for sharing this discovery with us6.
The following is an excerpt of the JavaScript code that includes the message sent to the two Telegram bots.
The attacker uses this backend to track compromises and visits for this ClickFix cluster.
By extracting the chat logs of the Telegram bots “#SNE | GMEET OTSTUK” using the Telegram API, we discovered a discussion between sparkhash, the alleged developer of this ClickFix cluster, and the traffer Alexmen. Our investigation revealed that both threat actors are members of the traffers team “Slavic Nation Empire (SNE)“, which is a sub-team of the cryptocurrency scam team “Marko Polo“.
Cybercriminals frequently use Telegram bots to monitor their activities, especially when this involves working in a team and collaborating with affiliates (traffers/workers).
Based on our analysis of this cluster’s activities and the messages shared between the threat actors operating and using it, Sekoia analysts advance the following hypothesis:
TDR confidently associate this cluster impersonating Google Meet with the traffers team “Slavic Nation Empire (SNE)”, also known as “Slavice Nation Land”. This team provides its members a comprehensive kit for sophisticated scams targeting users of cryptocurrency assets, Web3 applications, decentralised finance, and NFT. The kit includes landing pages impersonating software and video conferencing webpages, along with infostealers, drainers, and automation tools to coordinate attacks.
The traffers team “Slavic Nation Empire (SNE)” is a sub-group of the cryptocurrency scam team “Marko Polo” and part of the Russian-speaking cybercrime ecosystem. We would like to thank the cybersecurity researcher g0njxa for sharing some valuable hints on these groups with us. Additionally, Recorded Future researchers have published two reports detailing Marko Polo campaigns78.
Moreover, we discovered that the traffers team “Scamquerteo” also used this ClickFix cluster impersonating Google Meet, specifically using the FQDN “meet[.]google[.]webjoining[.]com” to spread malware. The traffers team “Scamquerteo Team” is a sub-group of the cryptocurrency scam team “CryptoLove” and part of the Russian-speaking cybercrime ecosystem.
During our investigation, we were able to interact with their Telegram bot, which manages operating the traffers activities for the fake Google Meet cluster, as shown by the following figure.
Both traffers teams, “Slavic Nation Empire (SNE)” and “Scamquerteo“, use the same ClickFix template that impersonates Google Meet. This discovery suggests that these teams share materials, also known as “landing project”, as well as infrastructure.
Sekoia analysts assess with medium confidence that both teams use the same cybercrime service to supply them with this fake Google Meet cluster, that remains unknown at the time of writing. Additionally, it is likely that a third party manages their infrastructure or registers their domain names.
ClickFix is an emerging social engineering tactic first observed in 2024. As of September 2024, several intrusion sets already adopted it to widely distribute malware through email phishing campaigns, compromised websites, and distribution infrastructures.
The ClickFix tactic deceives users into downloading and running malware on their machines without involving a web browser for download or requiring manual file execution. It makes it possible to bypass web browser security features, such as Google Safe Browsing, and to appear less suspicious to unsuspecting corporate and individual users.
The ClickFix cluster analysed in this blog post employs a decoy that could be particularly devastating in campaigns targeting organisations that use Google Workspace, especially Google Meet. The investigation into the traffers team distributing this cluster suggests that it primarily targets cryptocurrency assets, Web3 applications, decentralised finance, and NFT users. However, we believe that similar social engineering techniques could be employed in other malware distribution campaigns.
The list of IoCs is available on Sekoia.io GitHub repository.
Phishing domains impersonating Google Meet:
meet[.]google[.]us-join[.]com
meet[.]googie[.]com-join[.]us
meet[.]google[.]com-join[.]us
meet[.]google[.]web-join[.]com
meet[.]google[.]webjoining[.]com
meet[.]google[.]cdm-join[.]us
meet[.]google[.]us07host[.]com
googiedrivers[.]com
77.221.157[.]170
Phishing URLs impersonating Google Meet pages:
hxxps://meet[.]google[.]com-join[.]us/wmq-qcdn-orj
hxxps://meet[.]google[.]us-join[.]com/ywk-batf-sfh
hxxps://meet[.]google[.]us07host[.]com/coc-btru-ays
hxxps://meet[.]google[.]webjoining[.]com/exw-jfaj-hpa
Infection chains:
googiedrivers[.]com (payload download)
us18web-zoom[.]us (payload download)
webapizmland[.]com (fingerprint data exfiltration)
carolinejuskus[.]com (macOS payload download)
95.182.97[.]58 (Stealc C2)
91.103.140[.]200 (Rhadamanthys C2)
85.209.11[.]155 (AMOS Steaker C2)
hxxps://googIedrivers[.]com/fix-error (payload download)
hxxps://us18web-zoom[.]us/stealc.exe (payload download)
hxxps://us18web-zoom[.]us/ram.exe (payload download)
hxxps://webapizmland[.]com/api/cmdruned (payload download)
hxxp://95.182.97[.]58/84b7b6f977dd1c65.php (Stealc C2)
hxxp://91.103.140[.]200:9078/3936a074a2f65761a5eb8/6fmfpmi7.fwf4p (Rhadamanthys C2)
hxxps://carolinejuskus[.]com/kusaka.php?call=launcher (macOS payload download)
hxxp://85.209.11[.]155/joinsystem (AMOS Stealer C2)
92a8cc4e385f170db300de8d423686eeeec72a32475a9356d967bee9e3453138 (malicious HTML payload)
a834be6d2bec10f39019606451b507742b7e87ac8d19dc0643ae58df183f773c (Stealc payload)
2853a61188b4446be57543858adcc704e8534326d4d84ac44a60743b1a44cbfe (Rhadamanthys payload)
94379fa0a97cc2ecd8d5514d0b46c65b0d46ff9bb8d5a4a29cf55a473da550d5 (AMOS Stealer payload)
AMOS Stealer distribution infrastructure:
alienmanfc6[.]com
apunanwu[.]com
bowerchalke[.]com
carolinejuskus[.]com
cautrucanhtuan[.]com
cphoops[.]com
dekhke[.]com
iloanshop[.]com
kansaskollection[.]com
lirelasuisse[.]com
mdalies[.]com
mensadvancega[.]com
mishapagerealty[.]com
modoodeul[.]com
pabloarruda[.]com
pakoyayinlari[.]com
patrickcateman[.]com
phperl[.]com
stonance[.]com
utv4fun[.]com
Sekoia.io TDR uncovered a large-scale malware distribution infrastructure allegedly associated with several traffers team which use the fake Google Meet cluster. This infrastructure was unveiled based on passive DNS, Whois lookups, and HTML similarities, such as title, text, favicon and resources.
This infrastructure includes webpages impersonating platforms like Zoom, video games, office software, and fake Web3 applications, which spread Stealc, Rhadamanthys, and AMOS Stealer to Web3 gamers.
us01web-zoom[.]us us03web-zoom[.]us us07web-zoom[.]us us08web-zoom[.]us us09web-zoom[.]us us10web-zoom[.]us us18web-zoom[.]us us30web-zoom[.]us us40web-zoom[.]us us45web-zoom[.]us us50web-zoom[.]us us60web-zoom[.]us us70web-zoom[.]us us77web-zoom[.]us us80web-zoom[.]us us85web-zoom[.]us us95web-zoom[.]us | us004web-zoom[.]us us005web-zoom[.]us us006web-zoom[.]us us007web-zoom[.]us us008web-zoom[.]us us050web-zoom[.]us us055web-zoom[.]us us500web-zoom[.]us us505web-zoom[.]us us555web-zoom[.]us us002webzoom[.]us us4web-zoom[.]us | us01web[.]us us03web[.]us us08web[.]us us09web[.]us us15web[.]us us20web[.]us us40web[.]us us50web[.]us us55web[.]us web05-zoom[.]us |
Feel free to read other Sekoia.io TDR (Threat Detection & Research) analysis here :