ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware
嗯,用户让我帮忙总结一篇文章的内容,控制在100个字以内,而且不需要特定的开头。首先,我需要理解这篇文章讲的是什么。 文章主要讨论了一个新的网络攻击活动,叫做ClickFix。攻击者利用了被入侵的合法网站来传播一种叫做MIMICRAT的远程访问木马。这个木马通过多阶段的PowerShell脚本绕过安全检测,最终在受害者的系统中执行恶意代码。 接下来,我需要提取关键信息:新的ClickFix活动、利用合法网站、传播MIMICRAT RAT、多阶段PowerShell绕过检测、最终植入木马。同时,文章提到攻击可能的目标是部署勒索软件或窃取数据。 然后,我要把这些信息浓缩到100字以内,确保涵盖主要点:活动名称、传播方式、恶意软件名称、技术手段、攻击目标等。还要注意语言简洁明了,避免使用复杂的术语。 最后,检查一下是否符合用户的要求:100字以内,直接描述内容,没有特定的开头。确保没有遗漏重要信息,并且表达清晰。 </think> 新的ClickFix网络攻击活动利用被入侵的合法网站传播名为MIMICRAT的远程访问木马(RAT),通过多阶段PowerShell链绕过安全检测,并最终植入恶意软件以实现对受害者的全面控制。攻击目标可能涉及勒索软件部署或数据窃取。 2026-2-20 11:55:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

Malware / Threat Intelligence

Cybersecurity researchers have disclosed details of a new ClickFix campaign that abuses compromised legitimate sites to deliver a previously undocumented remote access trojan (RAT) called MIMICRAT (aka AstarionRAT).

"The campaign demonstrates a high level of operational sophistication: compromised sites spanning multiple industries and geographies serve as delivery infrastructure, a multi-stage PowerShell chain performs ETW and AMSI bypass before dropping a Lua-scripted shellcode loader, and the final implant communicates over HTTPS on port 443 using HTTP profiles that resemble legitimate web analytics traffic," Elastic Security Labs said in a Friday report.

According to the enterprise search and cybersecurity company, MIMICRAT is a custom C++ RAT with support for Windows token impersonation, SOCKS5 tunneling, and a set of 22 commands for comprehensive post-exploitation capabilities. The campaign was discovered earlier this month.

It's also assessed to share tactical and infrastructural overlaps with another ClickFix campaign documented by Huntress that leads to the deployment of the Matanbuchus 3.0 loader, which then serves as a conduit for the same RAT. The end goal of the attack is suspected to be ransomware deployment or data exfiltration.

In the infection sequence highlighted by Elastic, the entry point is bincheck[.]io, a legitimate Bank Identification Number (BIN) validation service that was breached to inject malicious JavaScript code that's responsible for loading an externally hosted PHP script. The PHP script then proceeds to deliver the ClickFix lure by displaying a fake Cloudflare verification page and instructing the victim to copy and paste a command into the Windows Run dialog to address the issue.

This, in turn, leads to the execution of a PowerShell command, which then contacts a command-and-control (C2) server to fetch a second-stage PowerShell script that patches Windows event logging (ETW) and antivirus scanning (AMSI) before dropping a Lua-based loader. In the final stage, the Lua script decrypts and executes in memory shellcode that delivers MIMICRAT.

The Trojan uses HTTPS for communicating with the C2 server, allowing it to accept two dozen commands for process and file system control, interactive shell access, token manipulation, shellcode injection, and SOCKS proxy tunneling.

"The campaign supports 17 languages, with the lure content dynamically localized based on the victim's browser language settings to broaden its effective reach," security researcher Salim Bitam said. "Identified victims span multiple geographies, including a USA-based university and multiple Chinese-speaking users documented in public forum discussions, suggesting broad opportunistic targeting."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/clickfix-campaign-abuses-compromised.html
如有侵权请联系:admin#unsafe.sh