Today > 1 Critical | 2 High | 6 Medium vulnerabilities   -   You can now download lists of IOCs here!

Beware: Fake Google Meet Pages Deliver Infostealers in Ongoing ClickFix Campaign

Oct. 21, 2024, 9:54 a.m.

Description

Threat actors are using fake Google Meet web pages as part of the ClickFix campaign to deliver infostealers targeting Windows and macOS systems. The attackers display fake error messages in web browsers, tricking users into executing malicious PowerShell code. The campaign has expanded to impersonate various online services, including Facebook, Google Chrome, and reCAPTCHA. On Windows, the attack deploys StealC and Rhadamanthys stealers, while macOS users are targeted with the Atomic stealer. The tactic evades detection by having users manually run the malicious code. Two traffers groups, Slavic Nation Empire and Scamquerteo, are attributed to this campaign, suggesting shared materials and infrastructure.

Date

Published: Oct. 18, 2024, 2:09 p.m.

Created: Oct. 18, 2024, 2:09 p.m.

Modified: Oct. 21, 2024, 9:54 a.m.

Attack Patterns

Atomic

StealC

Rhadamanthys

T1059.001

T1012

T1114

T1087

T1113

T1005

T1547

T1082

T1083

T1055

T1036

T1204

T1056

T1566