DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials
嗯,用户让我用中文总结这篇文章,控制在一百个字以内,而且不需要用“文章内容总结”这样的开头。首先,我得仔细阅读这篇文章,理解它的主要内容。 文章讲的是一个新的网络攻击活动,利用ClickFix钓鱼战术分发名为DeepLoad的恶意软件加载器。这个加载器使用AI辅助的混淆技术和进程注入来逃避静态扫描。一旦运行,它会立即窃取用户的凭证,并且隐藏自己的踪迹,比如禁用PowerShell命令历史记录,使用合法的Windows进程来隐藏恶意活动。 此外,DeepLoad还会生成动态链接库文件,并使用随机文件名来避开检测。它还能通过USB等可移动设备传播,并利用WMI在三天后重新感染主机。文章还提到另一个恶意软件加载器Kiss Loader,通过钓鱼邮件传播。 现在我需要把这些信息浓缩到100字以内。重点包括:新的攻击活动、利用ClickFix、DeepLoad的功能(AI混淆、进程注入、窃取凭证、隐藏踪迹)、传播方式(USB、WMI)以及另一个恶意软件Kiss Loader。 可能的结构是:新的攻击活动利用ClickFix分发DeepLoad恶意软件加载器,该加载器通过AI混淆和进程注入逃避检测,并窃取凭证。此外,它还能通过USB传播,并在三天后重新感染主机。另一个恶意软件Kiss Loader也通过钓鱼邮件传播。 检查一下字数是否在限制内。如果超过的话,可能需要删减一些细节,比如Kiss Loader的部分可能可以省略,因为用户主要关注的是DeepLoad的内容。 最终总结:新的攻击活动利用ClickFix分发DeepLoad恶意软件加载器,该加载器通过AI混淆和进程注入逃避检测,并窃取凭证。此外,它还能通过USB传播,并在三天后重新感染主机。 </think> 新的攻击活动利用ClickFix钓鱼战术分发名为DeepLoad的恶意软件加载器,该加载器通过AI辅助的混淆技术和进程注入技术逃避静态扫描,并立即窃取用户密码和会话信息。此外,DeepLoad隐藏自身痕迹并利用Windows合法进程掩盖恶意行为,并可通过USB等可移动设备传播至其他机器。 2026-3-30 15:47:0 Author: thehackernews.com(查看原文) 阅读量:3 收藏

Threat Intelligence / Browser Security

A new campaign has leveraged the ClickFix social engineering tactic as a way to distribute a previously undocumented malware loader referred to as DeepLoad.

"It likely uses AI-assisted obfuscation and process injection to evade static scanning, while credential theft starts immediately and captures passwords and sessions even if the primary loader is blocked," ReliaQuest researchers Thassanai McCabe and Andrew Currie said in a report shared with The Hacker News.

The starting point of the attack chain is a ClickFix lure that tricks users into running PowerShell commands by pasting the command into the Windows Run dialog under the pretext of addressing a non-existent issue. This, in turn, uses "mshta.exe," a legitimate Windows utility to download and run an obfuscated PowerShell loader.

The loader, for its part, has been found to conceal its actual functionality among meaningless variable assignments, likely in an attempt to deceive security tools. It's assessed that the threat actors relied on an artificial intelligence (AI) tool to develop the obfuscation layer.

DeepLoad makes deliberate efforts to blend in with regular Windows activity and fly under the radar. This includes hiding the payload within an executable named "LockAppHost.exe," a legitimate Windows process that manages the lock screen.

In addition, the malware covers up its own tracks by disabling PowerShell command history and invoking native Windows core functions directly instead of relying on PowerShell's built-in commands to launch processes and modify memory. In doing so, it bypasses common monitoring hooks that keep tabs on PowerShell-based activity.

"To evade file-based detection, DeepLoad generates a secondary component on the fly by using the built-in PowerShell feature Add-Type, which compiles and runs code written in C#," ReliaQuest said. "This produces a temporary Dynamic Link Library (DLL) file dropped into the user's Temp directory."

This offers a way for the malware to sidestep file name-based detections, as the DLL is compiled every time it's executed and written with a randomized file name.

Another notable defense evasion tactic adopted by DeepLoad is the use of asynchronous procedure call (APC) injection to run the main payload inside a trusted Windows process without a decoded payload written to disk after launching the target process in a suspended state, writing shellcode into its memory, and then resuming the execution of the process.

DeepLoad is designed to facilitate credential theft by extracting browser passwords from the host. It also drops a malicious browser extension that intercepts credentials as they are being entered on login pages and persists across user sessions unless it's explicitly removed.

A more dangerous feature of the malware is its ability to automatically detect when removable media devices like USB drives are connected and copy the malware-laced files using names like "ChromeSetup.lnk," "Firefox Installer.lnk," and "AnyDesk.lnk" so as to trigger the infection once it's doubled-clicked.

"DeepLoad used Windows Management Instrumentation (WMI) to reinfect a 'clean' host three days later with no user action and no attacker interaction," ReliaQuest explained. "WMI served two purposes: It broke the parent-child process chains most detection rules are built to catch, and it created a WMI event subscription that quietly re-executed the attack later."

The goal, it appears, is to deploy multi-purpose malware that can perform malicious actions across the cyber kill chain and sidestep detection by security controls by avoiding writing artifacts to disk, blending into Windows processes, and spreading quickly to other machines.

The disclosure comes as G DATA detailed another malware loader dubbed Kiss Loader that's distributed through Windows Internet Shortcut files (URL) attached to phishing emails, which then connects to a remote WebDAV resource hosted on a TryCloudflare domain to serve a secondary shortcut that masquerades as a PDF document.

Once executed, the shortcut launches a WSH script responsible for running a JavaScript component, which proceeds to retrieve and execute a batch script that displays a decoy PDF, sets up persistence in the Startup folder, and downloads the Python-based Kiss Loader. In the final stage, the loader decrypts and runs Venom RAT, an AsyncRAT variant, using APC injection.

It's currently not known how widespread attacks deploying Kiss Loader are, and if it's being offered under a malware-as-a-service (MaaS) model. That said, the threat actor behind the loader claims to be from Malawi.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/deepload-malware-uses-clickfix-and-wmi.html
如有侵权请联系:admin#unsafe.sh