InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Matrix Push C2 uses browser notifications for fileless, cross-platform phishing attacks
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Matrix Push C2 uses browser notifications for fileless, cross-platform phishing attacks
Technology

Matrix Push C2 uses browser notifications for fileless, cross-platform phishing attacks

November 23, 2025 6 Min Read
Share
Matrix Push C2 uses browser notifications for fileless, cross-platform phishing attacks
SHARE

Malicious attackers are leveraging browser notifications as a vector for phishing attacks to distribute malicious links using a new command-and-control (C2) platform called Matrix Push C2.

“This browser-native fileless framework leverages push notifications, fake alerts, and link redirects to targeted victims across operating systems,” Blackfog researcher Brenda Robb said in a report Thursday.

In these attacks, potential targets are tricked into allowing browser notifications through social engineering on malicious or legitimate websites.

Once a user agrees to receive notifications from a site, the attacker leverages the web browser’s built-in web push notification mechanism to send alerts that appear to be sent by the operating system or the browser itself. This leverages a trusted brand, a familiar logo, and compelling language to keep the game going.

These include alerts about things like suspicious logins and browser updates, as well as helpful “confirm” and “refresh” buttons that, when clicked, redirect you to a fake site.

What makes this a smart technique is that the entire process takes place through the browser without the need to first infect the victim’s system through other means. In some ways, this attack is similar to ClickFix in that users are tricked into following specific instructions to compromise their systems, thereby effectively bypassing traditional security controls.

That’s not all. This attack is also a cross-platform threat as it is carried out via a web browser. This essentially joins the browser applications on the platform that subscribe to malicious notifications into a pool of clients, giving the adversary a persistent communication channel.

Matrix Push C2 is offered as a Malware-as-a-Service (MaaS) kit to other threat actors. It is sold directly through crimeware channels (usually via Telegram or cybercrime forums) on a tiered subscription model. Prices are approximately $150 for one month, $405 for three months, $765 for six months, and $1,500 for one year.

See also  Hackers are actively exploiting the 7-Zip symbolic link-based RCE vulnerability (CVE-2025-11001)

“Payments are accepted in cryptocurrencies and buyers communicate directly with operators for access,” BlackFog founder and CEO Dr. Darren Williams told Hacker News. “Matrix Push was first observed in early October and has been active ever since. There is no evidence of older versions, previous brands, or long-standing infrastructure. All indicate this is a newly launched kit.”

Accessible as a web-based dashboard, the tool allows users to send notifications, track each victim in real-time, determine which notifications a victim interacted with, create shortened links using the built-in URL shortener, and even log installed browser extensions, including cryptocurrency wallets.

“The core of the attack is social engineering, and Matrix Push C2 includes configurable templates to maximize the authenticity of fake messages,” Robb explained. “An attacker can easily theme a phishing notification or landing page to impersonate a well-known company or service.”

Some of the supported notification validation templates are associated with well-known brands such as MetaMask, Netflix, Cloudflare, PayPal, and TikTok. The platform also includes an “Analytics and Reports” section that allows customers to measure the effectiveness of their campaigns and make adjustments as needed.

“Matrix Push C2 represents a change in the way attackers seek to gain initial access and exploit users,” BlackFog said. “Once a user’s endpoint (computer or mobile device) is affected by this type of impact, an attacker may escalate the attack over time.”

“They may deliver additional phishing messages to steal credentials, trick users into installing more persistent malware, or even leverage browser exploits to gain deeper control over the system.The end goal is often to steal data or monetize access by exfiltrating cryptocurrency wallets or exfiltrating personal information.”

See also  China's hacker red noveler target global government using pantegana and cobalt strike

Attacks exploiting Velociraptors are on the rise

The development comes after Huntress said it had observed a “significant increase” in attacks armed with the legitimate Velociraptor digital forensics and incident response (DFIR) tool over the past three months.

On November 12, 2025, the cybersecurity vendor announced that attackers deployed Velociraptor after gaining initial access by exploiting a flaw in Windows Server Update Services (CVE-2025-59287, CVSS score: 9.8) that was patched by Microsoft late last month.

The attackers then allegedly conducted reconnaissance and launched discovery queries aimed at gathering details about users, running services, and configurations. The attack was contained before it could progress further, Huntress added.

This discovery shows that attackers are not only using custom C2 frameworks, but also leveraging off-the-shelf offensive cybersecurity and incident response tools.

“We have seen threat actors use legitimate tools for a long time, so we know that Velociraptor is not the first dual-use open source tool to emerge in attacks, and it will not be the last,” Huntress researchers said.

Share This Article
Twitter Copy Link
Previous Article A gorgeous twist on Diablo combat with the structure of Hades, Hell Clock now feels better than ever A gorgeous twist on Diablo combat with the structure of Hades, Hell Clock now feels better than ever
Next Article Once upon a time, a tariff on tea sparked a revolution. now they are creating anxiety Once upon a time, a tariff on tea sparked a revolution. now they are creating anxiety

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

ShadowRay 2.0 exploits unpatched Ray flaw to build self-spreading GPU cryptomining botnet
Technology

ShadowRay 2.0 exploits unpatched Ray flaw to build self-spreading GPU cryptomining botnet

5 Min Read
X warns users with security keys to re-register by November 10 to avoid lockout
Technology

X warns users with security keys to re-register by November 10 to avoid lockout

2 Min Read
Smishing Triad links to 194,000 malicious domains in global phishing operation
Technology

Smishing Triad links to 194,000 malicious domains in global phishing operation

5 Min Read
comicform and sectorJ149 hacker deploys form book malware in Eurasian cyberattack
Technology

comicform and sectorJ149 hacker deploys form book malware in Eurasian cyberattack

5 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?