New ErrTraffic service enables ClickFix attacks via fake browser glitches
好的,我现在需要帮用户总结一篇文章,控制在100字以内。首先,我得仔细阅读文章内容,抓住关键点。 文章主要讲的是一个叫做ErrTraffic的新网络犯罪工具。它允许威胁行为者自动化ClickFix攻击。ClickFix是一种社会工程学技巧,诱骗用户执行危险命令,比如修复技术问题或验证身份。 ErrTraffic通过在被黑网站生成“假故障”来诱骗用户下载有效负载或遵循恶意指令。文章提到它承诺高达60%的转化率,并能根据目标系统提供兼容的有效负载。这个工具在2024年尤其流行,被网络犯罪分子和国家支持的参与者采用。 接下来,我需要将这些信息浓缩到100字以内。要确保包含工具名称、功能、攻击方式、转化率以及其受欢迎程度。 可能的结构是:介绍工具名称和功能,说明它如何生成假故障,诱骗用户下载有效负载,并提到其高转化率和受欢迎程度。 最后检查字数,确保不超过限制,并且语言简洁明了。 </think> 一种名为ErrTraffic的新网络犯罪工具允许威胁行为者通过在被黑网站生成“假故障”来自动化ClickFix攻击,诱骗用户下载恶意软件或执行危险命令。该平台承诺高达60%的转化率,并能根据目标系统提供兼容的有效负载。 2025-12-30 21:15:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:1 收藏

New ErrTraffic service enables ClickFix attacks via fake browser glitches

A new cybercrime tool called ErrTraffic allows threat actors to automate ClickFix attacks by generating 'fake glitches' on compromised websites to lure users into downloading payloads or following malicious instructions.

The platform promises conversion rates as high as 60% and can determine the target system to deliver compatible payloads.

ClickFix is a social engineering technique where targets are tricked into executing dangerous commands on their systems under believable pretenses, such as fixing technical problems or validating their identity.

Wiz

It has grown in popularity since 2024, especially this year, as both cybercriminals and state-sponsored actors have adopted it for its effectiveness in bypassing standard security controls.

Automating ClickFix

ErrTraffic is a new cybercrime platform first promoted on Russian-speaking hacking forums earlier this month by someone using the alias LenAI.

It functions as a self-hosted traffic distribution system (TDS) that deploys ClickFix lures and is sold to customers for a one-time purchase of $800.

The service promoted on hacker forums
Service promoted on hacker forums
Source: Hudson Rock

Hudson Rock researchers who analyzed the platform report that it offers a user-friendly panel that provides various configuration options and access to real-time campaign data.

The attacker must already control a website that accepts victim traffic, or has injected malicious code into a legitimate, compromised website, and then add ErrTraffic to it via an HTML line.

The main panel
The main panel
Source: Hudson Rock

The site’s behavior remains the same for regular visitors who do not match the targeting criteria, but when geolocation and OS fingerprinting conditions are met, the page’s DOM is modified to display a visual glitch.

The issues may include corrupted or illegible text, font replacement with symbols, fake Chrome updates, or missing system font errors.

This makes the page appear "broken" and creates the condition to provide the victim a 'solution' in the form of installing a browser update, downloading a system font, or pasting something in the command prompt.

Glitch
Visual glitch generated by ErrTraffic
Source: Hudson Rock

If the victim follows the instructions, a PowerShell command is added to the clipboard by means of JavaScript code. Executing the command leads to downloading a payload.

ClickFix delivery mechanism in ErrTraffic
ClickFix delivery mechanism in ErrTraffic
source: Hudson Rock

Hudson Rock explicitly specifies that the payloads are Lumma and Vidar info-stealers on Windows, Cerberus trojan on Android, AMOS (Atomic Stealer) on macOS, and unspecified Linux backdoors.

Defining the payloads for each OS
Defining the payloads for each OS
Source: Hudson Rock

ErrTraffic clients can define the payload for each targeted architecture and specify the countries that qualify for infection. However, there’s a hardcoded exclusion for CIS (Commonwealth of Independent States) countries, which may indicate the origin of ErrTraffic's developer.

Hudson Rock, which monitors the entire credential-theft lifecycle, reports that, in most cases, the harvested data is sold on darknet markets or leveraged to compromise more websites and inject the ErrTraffic script again.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/new-errtraffic-service-enables-clickfix-attacks-via-fake-browser-glitches/
如有侵权请联系:admin#unsafe.sh