InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Hackers use Tiktok videos to distribute Vidar and Stealc malware via Clickfix techniques
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Hackers use Tiktok videos to distribute Vidar and Stealc malware via Clickfix techniques
Technology

Hackers use Tiktok videos to distribute Vidar and Stealc malware via Clickfix techniques

May 24, 2025 5 Min Read
Share
Hackers use Tiktok videos to distribute Vidar and Stealc malware via Clickfix techniques
SHARE

Malware known as Latrodectus It is now the latest to accept widely used social engineering technology called Clickfix as a distribution vector.

“Clickfix techniques are particularly dangerous because malware can be run in memory rather than being written to disk,” the report shared with Hacker News states. “This will give you more opportunities for browsers and security tools to detect or block malware.”

Latrodectus, considered to be the successor to IcedID, is a name given to malware that acts as a downloader for other payloads, such as ransomware. It was first documented in April 2024 by ProofPoint and Team Cymru.

Incidentally, this malware is one of many malicious software that suffers operational setbacks as part of the operational Endgame, defeating 300 servers around the world, 650 domains related to Bumblebee, lacrotectus, Qakbot, Hijackloader, Danabot, Trickbot and Warmcokie on May 19th, 2025.

In the latest set of Latrodectus attacks observed by Expel in May 2025, unsuspecting users will be tricked into copying and running PowerShell commands from infected websites.

“When a user runs these commands use MSIEXEC to install files at the remote URL and try to run them in memory,” Expel said. “This eliminates the need for attackers to write files to their computers and runs the risk of being detected by antiviruses that could be detected on a browser or disk.”

The MSI installer contains legitimate NVIDIA applications that are used to sideload malicious DLLs. This will use Curl to download the main payload.

To mitigate this type of attack, we recommend using Group Policy Objects (GPOs) to disable the Windows Run program or turning off the “Windows+R” hotkey via changes to the Windows registry.

See also  Google releases Android updates to patch two actively exploited vulnerabilities

From Clickfix to Tiktok

This disclosure comes when Trend Micro reveals details about its new social engineering campaign. This happened by using Tiktok videos generated using artificial intelligence (AI) tools, instead of relying on fake Captcha pages, to provide Vidar and StealC infosteel, instructing the user to instruct them to run malicious commands on the system to activate Windows, Microsoft Office, Capcut, and spotify.

These videos have been posted from various Tiktok accounts such as @gitallowed, @zane.houghton, @allaivo2, @sysglow.wow, @alexfixpc, and @digitaldreams771. These accounts are no longer active. One video claiming to provide instructions on how to “improve your Spotify experience instantly” has accumulated almost 500,000 views with over 20,000 likes and over 100 comments.

This campaign marks a new escalation of Clickfix in that it is visually guided by users searching for how to activate pirated apps, and is visually guided to open Windows Run dialogs by launching “Windows + R” hotkey, PowerShell, running highlighted commands in the video, and ultimately registering your own system.

“Threat Actors is currently running Powershell commands to use social engineer users using Tiktok videos that are potentially generated using tools with AI to use social engineer users to activate legitimate software or unleash premium features.”

“The campaign highlights that attackers are ready to weaponize the currently popular social media platforms for distributing malware.”

Fake ledger app used to steal seed phrases for Mac users

The findings continue to discover four different malware campaigns that leverage the cloned version of the Ledger Live app to steal sensitive data, such as seed phrases, with the goal of ejecting victims’ cryptocurrency wallets. Activities have been continuing since August 2024.

See also  A new research paper questions the price of "tokens" in AI chat

The attack uses a malicious DMG file that launches Applescript on startup to remove passwords and Apple note data and downloads the Trojanized version of Ledger Live. When the app is opened, it warns users of expected account issues and warns that seed phrases are required for recovery. The seed phrase entered is sent to the attacker control server.

MoonLock Lab, which shed light on the campaign, said the Rogue app uses Macos Stealer Malware, such as Atomic Macos Stealer (AMOS) and Odyssey.

“The dark web forum has grown chat about anti-leisure schemes. The next wave is already in shape,” says MacPaw’s cybersecurity department. “Hackers will continue to utilize the ownership trust of Crypto, which is located in Ledger Live.”

Share This Article
Twitter Copy Link
Previous Article Fallout creator Tim Kane says the remaster might prove too challenging to try Fallout creator Tim Kane says the remaster might prove too challenging to try
Next Article mm Build an infrastructure for effective atmosphere coding in the enterprise

Latest News

mm

AI and national security: a new battlefield

Artificial intelligence is changing the way nations protect themselves. It…

June 12, 2025
Zero-click AI vulnerability exposes Microsoft 365 Copilot data without user interaction

Zero-click AI vulnerability exposes Microsoft 365 Copilot data without user interaction

A new attack technology named Echoleak is characterized as a…

June 12, 2025
mm

Evogene and Google Cloud unveils basic models for the design of generative molecules, pioneering a new era of life science.

Evogene Ltd. has announced beginners in the class Generated AI…

June 11, 2025
Interpol dismantles over 20,000 malicious IPS linked to 69 running malware variants.

Interpol dismantles over 20,000 malicious IPS linked to 69 running malware variants.

Wednesday Interpol announced the dismantling of over 20,000 malicious IP…

June 11, 2025
mm

“Secure” images are not difficult to steal with AI.

New research suggests that watermarking tools aimed at blocking AI…

June 10, 2025

You Might Also Like

mm
Technology

Hunyuancustom brings single image video deepfake with audio and lip sync

26 Min Read
mm
Technology

A new research paper questions the price of “tokens” in AI chat

16 Min Read
APT Campaigns, Browser Hijacking, AI Malware, Cloud Breach, Important CVE
Technology

APT Campaigns, Browser Hijacking, AI Malware, Cloud Breach, Important CVE

31 Min Read
mm
Technology

Why Waabi’s AI-driven virtual trucks are the future of autonomous driving technology

10 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?