company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Healthcare

Data Breach

loading..
loading..
loading..

Lake Charles Memorial Health System Data Breach Affects 270,000 Patients

Lake Charles Memorial Health System (LCMHS) in Louisiana has suffered a data breach affecting almost 270,000 patients, with the Hive ransomware group claiming r...

29-Dec-2022
3 min read

No content available.

Related Articles

loading..

ClickFix

Sophisticated phishing campaign compromises hotel Booking.com accounts, enabling...

The "I Paid Twice" campaign represents a paradigm shift in cybercriminal operations, moving from broad phishing to a targeted, multi-faceted attack on the digital trust chain within the hospitality industry. This report provides a forensic-level dissection of the attack lifecycle, from initial social engineering to final monetization. The sophisticated interplay of the **ClickFix social engineering technique**, the **PureRAT malware-as-a-service (MaaS) platform**, and a specialized criminal underground economy, this Threatfeed illuminates the technical nuances that make this campaign both highly effective and resilient. ## **Attack Ecosystem** The campaign is not a singular attack but a **criminal enterprise** with distinct, specialized roles. It systematically targets hotels to compromise their Booking.com accounts, subsequently using that access to defraud customers. The technical execution reveals a high degree of professionalism, leveraging known techniques in novel combinations. * **Primary Vector:** Spear-phishing against hotel staff. * **Key Malware:** PureRAT, a .NET-based Remote Access Trojan. * **Monetization Method:** Business Email Compromise (BEC)-style fraud against hotel guests. * **Ecosystem Support:** Underground markets for credentials, malware distribution, and verification tools. ## **Dissection of the Attack Chain** The attack can be segmented into four distinct, interconnected phases, as illustrated below, forming a complete cyber kill chain. ```mermaid flowchart TD subgraph A [Phase 1: Initial Compromise] direction LR A1[Spear-phishing Email] --> A2[Redirection Chain TDS] --> A3[ClickFix Lure] end subgraph B [Phase 2: Malware Deployment] direction LR B1[PowerShell Execution] --> B2[Reconnaissance] --> B3[Persistence &<br>DLL Side-Loading] end subgraph C [Phase 3: Persistence & C2] C1[PureRAT MaaS] --> C2[C2 Communication] end subgraph D [Phase 4: Monetization] direction LR D1[Credential Theft] --> D2[Guest Fraud] end A --> B --> C --> D ``` ### **Initial Compromise & ClickFix Lure** This phase relies entirely on sophisticated social engineering to induce a user-initiated code execution. * **Weaponized Communication:** * **Source:** Emails originate from previously compromised, legitimate email accounts of other hotels, bypassing reputation-based filters. * **Lure Content:** Impersonates Booking.com with subjects like "New guest message about reservation – Tracking code: [Unique ID]". This creates a sense of urgency and legitimacy. * **Traffic Distribution System (TDS):** * The link within the email does not point directly to the payload. It leads to a redirection chain. Analysis shows the initial domain uses JavaScript to check the `window.self !== window.top` condition, forcing a navigation if loaded in an iframe. This anti-analysis technique helps evade sandboxed environments. * This TDS infrastructure, potentially a paid service, obscures the final payload URL and provides resilience against takedowns. * **The ClickFix Technique (Core Innovation):** * The final landing page is a highly convincing clone of a Booking.com login portal, complete with branding. * A fake CAPTCHA is presented. The critical element is a JavaScript function that automatically copies a malicious PowerShell command to the victim's clipboard upon loading the page. * The user is then instructed (via on-screen text) to press `Win + R`, paste the command, and press Enter. This technique is highly effective because it: 1. **Bypasses Email Filters:** No malicious attachment is sent. 2. **Exploits User Trust:** The request appears to be a legitimate troubleshooting step. 3. **Achieves Code Execution:** It directly leverages the user's authority to run system commands. ### **Malware Deployment & Persistence** The execution of the pasted command initiates an automated, fileless deployment sequence. 1. **Scripted Payload Retrieval:** * The initial PowerShell command is a download cradle that fetches a second, more complex PowerShell script from the attacker's server. * This secondary script performs reconnaissance, collecting system data (Hostname, Username, OS, AV product) and exfiltrating it to the C2 server. 2. **Payload Delivery and Composition:** * The script then downloads a ZIP archive containing: * One legitimate, signed executable (e.g., `libcef.dll` or `AudioSession.exe`). * Three malicious DLLs. * The files are extracted to a user-writable directory, typically `%AppData%\Local`. 3. **Persistence and Execution Mechanism:** * **Persistence:** Established via a Run Registry Key and a shortcut in the Startup folder. * **DLL Side-Loading:** The legitimate executable is vulnerable to DLL hijacking. When executed, it attempts to load a required DLL from its local directory. Instead, it loads the malicious DLL placed there by the attacker. * **Fileless Loading:** The malicious DLL acts as a loader, which then reflectively loads the PureRAT payload directly into memory. This avoids writing the primary malware binary to disk, evading signature-based detection. ### **Command and Control with PureRAT** PureRAT is a fully-featured MaaS platform, providing the attackers with deep and persistent access. * **Core Capabilities:** The RAT provides a comprehensive suite of spying and control functions, including: * Remote Desktop Control (VNC-like) * Keylogging and File System Management * Webcam and Microphone Capture * Traffic Proxying (enabling attackers to use the victim's network) * Data Exfiltration * **Modular Architecture:** PureRAT uses a plugin system. The core agent can be instructed by the C2 server to download and execute additional modules, such as: * `PluginRemoteDesktop` * `PluginExecuting` * `PluginFileManager` This modularity makes the malware highly adaptable. * **Communication and Obfuscation:** * **C2 Protocol:** Communication with the C2 server (e.g., `45[.]142[.]166[.]73:56001`) is conducted over **encrypted TLS sockets**, blending with normal web traffic. * **Fingerprinting:** Upon connection, the RAT transmits a detailed system fingerprint to the C2. * **Obfuscation:** The PureRAT payload is protected by **.NET Reactor**, a commercial obfuscator that complicates static analysis and reverse engineering. ### **The "I Paid Twice" Fraud** With persistent access, the attackers shift to their primary financial goal. * **Credential Harvesting:** Using keyloggers, memory dumpers, or simply browsing stolen files, attackers harvest credentials for the hotel's Booking.com extranet portal. * **The Fraudulent Act:** * Attackers access the portal using stolen cookies or credentials to view genuine, upcoming reservations. * They impersonate the hotel and contact guests via **WhatsApp or email**, often just before check-in. * The message claims a "problem with the bank" or a "security issue" and urges the guest to confirm their payment by wiring funds to a new, attacker-controlled bank account. * The use of legitimate guest and reservation details makes the scam highly convincing, leading to victims paying twice. ## **Underlying Criminal Infrastructure** The campaign's efficiency stems from a professionalized cybercrime ecosystem. * **Credential Markets:** Stolen Booking.com credentials are sold on underground forums like **LolzTeam**. Listings are detailed, including the number of views, last login, and price (typically $50-$500). * **Verification Tools:** "Log checkers" are sold as services (e.g., ~$40) to automatically verify the validity of stolen credentials through proxies, ensuring they are valuable before purchase. * **Malware Distribution:** The initial infection is potentially carried out by specialized actors known as "traffers" who are paid for successful installations. ## **A Multi-Layered Strategy** Defense requires a focus on the specific techniques used at each stage of the attack. **Table 1: MITRE ATT&CK Mapping and Mitigations** | Phase | Tactic | Technique (ID) | Mitigation Strategy | | :--- | :--- | :--- | :--- | | **Initial Access** | Phishing [T1566] | Spear-phishing Link [T1566.002] | **User Training:** Drill the "Never copy-paste & run commands" rule. Use email security that rewrites/checks URLs in real-time. | | **Execution** | Execution [T1059] | PowerShell [T1059.001] | **Restrict PowerShell:** Constrain language mode. Log ScriptBlock logging. Use AMSI. | | **Persistence** | Persistence [T1547] | Registry Run Keys [T1547.001] | **Endpoint Protection:** Use EDR/NGAV to monitor for registry modifications and DLL side-loading patterns. | | **Defense Evasion** | Defense Evasion [T1574] | DLL Side-Loading [T1574.002] | **Application Control:** Implement application whitelisting (e.g., AppLocker, WDAC). | | **C2 & Exfiltration** | Command & Control [T1071] | Application Layer Protocol (TLS) [T1071.001] | **Network Monitoring:** Monitor for anomalous outbound connections to rare ports (5600X). Use SSL/TLS inspection where policy allows. | | **Impact** | Impact [T1657](Financial Theft) | Fraudulent Transactions [T1656] | **Process & Policy:** Mandate multi-factor authentication (MFA) on all booking platform accounts. Educate customers to only pay through official, secure channels. | ### **Proactive Hunting Tips:** * **Hunt for ClickFix:** Search for PowerShell commands with parameters like `-win normal -enc` (a base64 encoded command) in command-line logs. * **Hunt for PureRAT:** Look for network connections on ports 56001-56003 and processes with names like `AudioSession.exe` making suspicious network calls. * **Monitor for Persistence:** Audit Run keys and Startup folder contents for unexpected entries. The "I Paid Twice" campaign is a potent reminder that modern cyber threats are complex, service-driven businesses. Its technical sophistication lies not in zero-day exploits, but in the masterful combination of social engineering ("ClickFix"), robust malware (PureRAT), and a specialized criminal economy. Defense is challenging but achievable through a layered security posture that emphasizes **user awareness**, **strict application control**, **robust endpoint detection and response**, and **enforcement of security policies** like MFA. Continuous threat intelligence regarding the evolving TTPs of such actors is paramount for organizations within the targeted sectors to protect their assets and, crucially, their customers' trust.

loading..   11-Nov-2025
loading..   8 min read
loading..

ClickFix

Advanced ClickFix attacks now use OS fingerprinting and video tutorials to trick...

ClickFix campaigns have evolved from simple phishing lures into sophisticated, automated social engineering platforms. The core attack vector remains the same—tricking a user into executing a malicious command—but the delivery mechanism now employs advanced technical evasion and powerful psychological manipulation, making it a significant threat that bypasses many conventional security controls. ### **Technical Attack Chain Analysis** The modern ClickFix attack can be deconstructed into a multi-stage process, as illustrated in the following sequence: ```mermaid flowchart TD A[Victim encounters fake<br>CAPTCHA via malvertising] --> B{Automated<br>OS Fingerprinting} B -- Windows --> C1[Powershell Command] B -- macOS --> C2[Terminal Command] B -- Linux --> C3[Bash Command] C1 & C2 & C3 --> D[Social Engineering Play] subgraph D [Social Engineering Play] D1[Embedded Video Tutorial] D2[Countdown Timer] D3[Auto-copied Command] end D --> E[User executes command<br>in terminal] E --> F[Payload Delivery<br>e.g., Lumma Stealer, RAT] ``` ### **Mitigation Strategy** A robust defense requires a combination of technical controls and human awareness, layered to protect at multiple stages of the attack chain. **1. Primary Technical Controls** * **Application Control:** Implement policies to block the execution of unauthorized scripts and binaries. Tools like Windows AppLocker or similar endpoint protection solutions are critical. * **Endpoint Detection & Response (EDR):** Configure EDR solutions to flag and alert on suspicious command-line and PowerShell activity, even from trusted processes like `msedge.exe`. * **Web Filtering & DNS Security:** Block access to known malicious domains and newly registered domains that often host these campaigns. **2. Human Layer: User Awareness Training** This is the most critical layer. Training must be explicit and reinforced: > **"No legitimate online service will ever require you to open your terminal, Run dialog, or PowerShell and execute a command. Any prompt that asks you to do so is a cyberattack."** Drill this core message into user awareness programs. Use real-world examples, like the ones from Push Security's blog, to make the training relatable and effective. The sophistication of ClickFix attacks demonstrates a clear trend towards social engineering that exploits user trust and bypasses technical defenses. While technical controls are essential, the ultimate mitigation is a culture of security awareness where users understand and reject the fundamental social engineering premise.

loading..   06-Nov-2025
loading..   2 min read
loading..

UPenn

Millionaire donors' net worth leaked in Penn data breach. Are you exposed? Check...

The University of Pennsylvania, a bastion of the Ivy League and a titan of academic research, is reeling tonight after confirming a catastrophic data breach—not from a complex digital siege, but from a brazen act of "sophisticated identity impersonation" that has exposed the most intimate details of its vast alumni and donor network. The hack, discovered on October 31, 2025, has been described by cybersecurity experts as a "philanthropic intelligence goldmine" for the attackers, who used a simple social engineering tactic to bypass millions of dollars in security infrastructure. The compromised data is a predator's dream: a detailed registry of wealth, influence, and personal history. #### **Unlocked a Fortune in Data** According to an urgent internal memo obtained by this outlet, the attackers did not use cutting-edge malware. Instead, they executed a "sophisticated identity impersonation," effectively conning university staff into handing over the digital keys to a treasure trove of systems, including: * **Salesforce CRM** (the primary donor relationship database) * **SharePoint & Box** (file storage with sensitive reports) * **Qlikview** (data analytics and wealth modeling platforms) * **Marketing Cloud** (the university's mass email system) The hackers then exploited this access, using Penn's own trusted channels to send a fraudulent email to nearly 700,000 individuals, a move that has shattered trust within the community. #### **Targeted Fraud** While the university's official statement is cautious, stating that the "nature of the information is under investigation," the threat actors are not being so discreet. In posts on dark web forums, they are boasting of a haul containing data on approximately **1.2 million individuals**, including: * **Full names, dates of birth, and physical addresses.** * **Personal and professional phone numbers and email addresses.** * **Lifetime donation history and capacity to give.** * **Estimated Net Worth.** * **Demographic and biographical details.** "This isn't just a list of names and emails. This is a curated dossier on who has money, how much they have, and where they live," said Dr. Elena Vance, a cybersecurity analyst we contacted for comment. "For the perpetrators, this is a strategic asset. For the victims, this is a personalized roadmap for every kind of fraud, from highly convincing phishing to reputational blackmail. The 'sophistication' wasn't in the code; it was in the psychological manipulation." #### **Halls of Academia** The fallout is immediate and severe. Alumni and donors, the lifeblood of the university's endowment, are expressing a potent mix of betrayal and fury. _"How dare they be so careless with our trust?" demanded Arthur Feldon, a prominent alumnus from the class of 1980. "We entrusted Penn with our philanthropic visions, not as a data point to be stolen and sold to the highest bidder. This is a profound failure of their duty as stewards."_ The breach raises alarming questions about the cybersecurity preparedness of even the world's wealthiest and most renowned institutions, which hold vast amounts of sensitive data on their most influential members. #### **What Happens Next?** The University of Pennsylvania has confirmed it is working with leading third-party forensic firms and has notified federal law enforcement, including the FBI. A wave of individualized breach notifications is expected to begin in the coming days, as mandated by law. However, for the 1.2 million people caught in this digital crossfire, the clock is already ticking. Security experts are urging all Penn affiliates to assume their data is compromised and to be hyper-vigilant against any communication—phone, email, or post—that appears to originate from the university or any affiliated entities.

loading..   05-Nov-2025
loading..   3 min read