Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Credentials Stolen. Show all posts

DeepLoad Malware Found Stealing Browser Data Using ClickFix

 


A contemporary cyber campaign is using a deceptive method known as ClickFix to distribute a previously undocumented malware loader called DeepLoad, raising fresh concerns about newly engineered attack techniques.

Researchers from ReliaQuest report that the malware is designed with advanced evasion capabilities. It likely incorporates AI-assisted obfuscation to make analysis more difficult and relies on process injection to avoid detection by conventional security tools. Alarmingly, the malware begins stealing credentials almost immediately after execution, capturing passwords and active session data even if the initial infection stage is interrupted.

The attack chain starts with a ClickFix lure, where users are misled into copying and executing a PowerShell command via the Windows Run dialog. The instruction is presented as a solution to a problem that does not actually exist. Once executed, the command leverages “mshta.exe,” a legitimate Windows binary, to download and launch a heavily obfuscated PowerShell-based loader.

To conceal its true purpose, the loader’s code is filled with irrelevant and misleading variable assignments. This approach is believed to have been enhanced using artificial intelligence tools to generate complex obfuscation layers that can bypass static analysis systems.

DeepLoad is carefully engineered to blend into normal system behavior. It disguises its payload as “LockAppHost.exe,” a legitimate Windows process responsible for managing the system lock screen, making its activity less suspicious to both users and security tools.

The malware also attempts to erase traces of its execution. It disables PowerShell command history and avoids standard PowerShell functions. Instead, it directly calls underlying Windows system functions to execute processes and manipulate memory, effectively bypassing monitoring mechanisms that track PowerShell activity.

To further evade detection, DeepLoad dynamically creates a secondary malicious component. By using PowerShell’s Add-Type feature, it compiles C# code during runtime, generating a temporary Dynamic Link Library (DLL) file in the system’s Temp directory. Each time the malware runs, this DLL is created with a different name, making it difficult for security solutions to detect based on file signatures.

Another key technique used is asynchronous procedure call (APC) injection. This allows the malware to execute its payload within a legitimate Windows process without writing a fully decoded malicious file to disk. It achieves this by launching a trusted process in a suspended state, injecting malicious code into its memory, and then resuming execution.

DeepLoad’s primary objective is to steal user credentials. It extracts saved passwords from web browsers and deploys a malicious browser extension that intercepts login information as users type it into websites. This extension remains active across sessions unless it is manually removed.

The malware also includes a propagation mechanism. When it detects the connection of removable media such as USB drives, it copies malicious shortcut files onto the device. These files use deceptive names like “ChromeSetup.lnk,” “Firefox Installer.lnk,” and “AnyDesk.lnk” to appear legitimate and trick users into executing them.

Persistence is achieved through Windows Management Instrumentation (WMI). The malware sets up a mechanism that can reinfect a system even after it appears to have been cleaned, typically after a delay of several days. This technique also disrupts standard detection methods by breaking the usual parent-child process relationships that security tools rely on.

Overall, DeepLoad appears to be designed as a multi-functional threat capable of operating across several stages of a cyberattack lifecycle. Its ability to avoid writing clear artifacts to disk, mimic legitimate system processes, and spread across devices makes it particularly difficult to detect and contain.

The exact timeline of when DeepLoad began appearing in real-world attacks and the overall scale of its use remain unclear. However, researchers describe it as a relatively new threat, and its use of ClickFix suggests it could spread more widely in the near future. There are also indications that its infrastructure may resemble a shared or service-based model, although it has not been confirmed whether it is being offered as malware-as-a-service.

In a separate but related finding, researchers from G DATA have identified another malware loader called Kiss Loader. This threat is distributed through phishing emails containing Windows Internet Shortcut files. When opened, these files connect to a remote WebDAV server hosted on a TryCloudflare domain and download another shortcut that appears to be a PDF document.

When executed, the downloaded file triggers a chain of scripts. It starts with a Windows Script Host process that runs JavaScript, which then retrieves and executes a batch script. This script displays a decoy PDF to avoid suspicion, establishes persistence by adding itself to the system’s Startup folder, and downloads the Python-based Kiss Loader.

In its final stage, Kiss Loader decrypts and executes Venom RAT, a remote access trojan, using APC injection. The extent of this campaign is currently unknown, and it is not clear whether the malware is part of a broader malware-as-a-service offering. The threat actor behind the operation has claimed to be based in Malawi, although this has not been independently verified.

Cyber threats are taking new shapes every day. Attackers are increasingly combining social engineering, fileless execution techniques, and advanced obfuscation to bypass traditional defenses. This evolution highlights the growing need for continuous monitoring, stronger endpoint protection, and improved user awareness to defend against increasingly sophisticated attacks.

Global Data Breach Uncovers 23 Million Stolen Credentials

 


As a consequence of the fact that a single set of login credentials can essentially unlock an individual's financial, professional, and personal life, the exposure of billions of passwords represents more than just a routine cybersecurity concern today- it signals a global crisis in the trust of digital systems and data security. 

Cybernews has recently reported a staggering number of 19 billion passwords that circulate on underground criminal forums right now, according to their findings. According to experts, this massive database of compromised credentials, which is one of the most extensive collections of credentials ever recorded, is intensifying cyberattacks around the globe in an attempt to increase their scale and sophistication. 

As opposed to isolated breaches of the past, this latest leak seems to have come from years of data breaches, reassembled and repurposed in a way that enables threat actors to launch highly automated and targeted attacks that can be used by threat actors. Not only is the leaked data being used to breach individual accounts, but it is also allowing credential stuffing campaigns to run on a large scale against banks, corporations, and government systems, involving automated login attempts using the leaked credentials. 

Due to this rapid development of the threat landscape, cybersecurity professionals are warning that attacks will become more personal, more frequent, and harder to detect in the future. Considering the sheer number of compromised passwords, it is evident that it is essential to implement more comprehensive digital hygiene practices, such as multi-factor authentication, regular password updates, and educating the public about the dangers associated with reused or weak credentials. Today's hyperconnected world is a powerful reminder that cybersecurity isn't an optional issue. This development serves as a strong reminder of the importance of maintaining strong digital hygiene.

As the threat posed by infostealer malware continues to grow, a thriving underground economy of stolen digital identities will continue to thrive as a result. Infections are silently carried out by these malicious programs that harvest sensitive information from devices. These details include login credentials, browser-stored data, and session cookies. These data are then sold or traded between cybercriminals. With billions of compromised records currently circulating within these illicit networks, it is alarming to see the scale of this ongoing data theft. 

One example of this was when a massive dataset, referred to as "ALIEN TXTBASE", was ingested into the widely trusted breach monitoring service, Have I Been Pwned, by cybersecurity expert Troy Hunt, known for being a very prominent case study. In the dataset, 1.5 terabytes of stealer logs are included, which contain approximately 23 billion individual data rows. These logs comprise 1.5 terabytes in total. According to the researchers, over 284 million distinct email accounts around the world were impacted by these breaches, which accounted for 493 million unique combinations of websites and email addresses. This trove of disclosed information underscores the magnitude of these breaches as they are becoming increasingly widespread and indiscriminate.

A malware program known as Infostealer does not target specific individuals but rather casts a wide net, infecting systems en large and stealing personal information without the knowledge of the user. As a result, there is an ever-increasing number of compromised digital identities that are constantly growing, which is a significant contributor to the global increase in the risks of account takeovers, fraud, and phishing attacks, as well as long-term privacy violations. 

It is common for individuals to believe they are unlikely targets for cybercriminals simply because they do not feel that they are "important enough." This belief is very, very false, and it is not possible to find a way to change it. In reality, modern cyberattacks are not manually orchestrated by hackers selecting a specific victim; instead, they are driven by automated tools capable of scanning and exploiting vulnerabilities at a large scale using automated tools. Regardless of whether a person has a professional or personal online presence, anyone can potentially be at risk, no matter what their profession, profile, or perceived importance is. 

The worst part is that, based on recent data, about 94% of the 19 billion leaked passwords were reused on multiple accounts in a way that makes the situation even more concerning. Cybercriminals can successfully infiltrate others using the same credentials once one account has been compromised, increasing the chances of successful attacks. It can be extremely difficult for an individual to cope with the consequences of a successful password breach. 

They may have to give up their email accounts, social media accounts, cloud storage accounts, financial applications, and more if they are hacked. When hackers have access to their accounts, they may use them to commit identity theft, open fraudulent credit lines, or conduct unauthorised financial transactions. As a result of the exposure of sensitive personal and professional information, it is also possible to face public humiliation, blackmail, or reputational damage, especially if malicious actors misuse compromised accounts for the dissemination of misinformation or for conducting illicit activities. 

As a result, cybercrime is becoming more sophisticated and sophisticated, thereby making everyone, regardless of their digital literacy, vulnerable without proper cybersecurity measures in place. Cybercrime risks are no longer theoretical—they are becoming a reality daily. Several leaked records reveal the inner workings of infostealer malware, offering a sobering insight into how these threats function in such a precise and stealthy manner. 

While traditional data breaches are focused on large corporate databases, infostealers typically infect individual devices without the user's knowledge and take a more insidious approach, often without the user being aware of it. In addition to extracting data such as saved passwords, session cookies, autofill entries, and browser history, these malicious tools can also extract a wide range of sensitive data as soon as they are embedded. 

Once the data is stolen, it is then trafficked into cybercriminal circles, leading to a vicious cycle of account takeovers, financial fraud, and identity theft. It has recently been reported that the ALIEN TXTBase dataset, which has received much attention because of its huge scope and structure, is a notable example of this trend. There is a misconception that this dataset stems from a single incident, but in fact, it is actually a compilation of stealer logs from 744 different files that were derived from a single incident. 

It was originally shared through a Telegram channel, where threat actors often spread such information in a very unregulated and open environment. Each entry in the dataset follows the same format as a password—URL, login, and password, which provides an in-depth look at the credentials compromised. Troy Hunt, a cybersecurity researcher, gathered these fragments and compiled them into one unified and analysed dataset, which was then incorporated into Have I Been Pwned, a platform that can be used to identify a user's vulnerability. 

It is important to note that only two sample files were initially reviewed; however, as it became clear that the extent of the leak was immense, the whole collection was merged and analysed to gain a clearer picture of the damage. By aggregating this data methodically, cybercriminals are demonstrating that they aren't merely exploiting isolated incidents; they're assembling vast, cumulative archives of stolen credentials that they're cultivating over time. By sharing and organising this data in such a widespread manner, the reach and effectiveness of infostealer campaigns can be accelerated, presenting a threat to both personal privacy as well as organisational security for many years to come.

Act Without Delay 


As a result of the recent security breaches of passwords, individuals can still protect themselves by taking action as soon as possible to protect themselves and their devices. Procrastination increases vulnerability as threats are rapidly evolving. 

Strengthen Passwords


Creating a strong, unique password is essential. Users should avoid using common patterns when writing their passwords and create passphrases that include uppercase, lowercase, numbers, and symbols, in addition to letters and numbers. Password managers can assist in creating and storing complex passwords securely. 

Replace Compromised Credentials


Changing passwords should be done immediately if they are reused across different websites or remain unchanged for an extended period, especially for sensitive accounts like email, banking, and social media. Tools like Have I Been Pwned can help identify breaches faster. 

Enable Multi-Factor Authentication 


A multi-factor authentication system (MFA) reduces the risk of a security breach by reducing the need to upload multiple authentication credentials. App-based authenticators such as Google Authenticator provide better security than SMS-based authenticators, which are still preferable. 

Use Privacy Tools

Several platforms like Cloaked provide disposable email addresses and masked phone numbers, which minimise the possibility of sensitive information being breached and the exposure of personal information. 

Stay Vigilant and Informed

It is critical to monitor account activity regularly, revoke untrusted entry to accounts, and enable alerts on untrusted devices. Staying informed through a trusted cybersecurity source and educating others on how to protect themselves will further enhance collective security. The growing threat of credential theft can be combated by raising awareness, taking timely action, and establishing strong security habits. 

Protecting a person's digital identity is an ongoing responsibility which requires vigilance, proactive measures, and continuous awareness. As a result of recent credential leaks of unprecedented scale and sophistication, it has become increasingly imperative for individuals as well as organisations to take additional measures to ensure their cybersecurity posture is as secure as possible. Proactive and continuous vigilance must become an integral part of all organisations' cybersecurity practices, incorporating not just robust password management and multi-factor authentication, but also regular security audits and real-time monitoring of digital assets. 

As a precautionary measure against exploitation, companies should implement comprehensive cybersecurity frameworks, which include employee training, threat intelligence sharing, and incident response planning. It is equally important that users adopt privacy-enhancing tools and remain informed about emerging threats to stay ahead of adversaries who continually change their tactics, thereby protecting themselves against the relentless attacks of cyber adversaries. 

In the end, protecting digital identities is a continuous commitment that requires both awareness and action; if you fail to perform these responsibilities, you expose your business and personal data to relentless cybercriminals. Stakeholders need to cultivate a culture of security, mindfulness,sadandeverage advanced protective measures. This will reduce their vulnerability in the increasingly interconnected digital ecosystems of today, preserving trust and resilience to overcome the challenges presented by cybersecurity threats.