Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SmartApeSG Campaign Exploits ClickFix for Malware Spread

SmartApeSG Campaign Exploits ClickFix for Malware Spread

Posted on March 25, 2026 By CWS

A cybersecurity threat campaign, known as SmartApeSG, has been identified utilizing a social engineering tactic called ClickFix to distribute various malware strains. This campaign, which is also recognized by the aliases ZPHP and HANEYMANEY, highlights the evolving techniques employed by cybercriminals to infiltrate systems.

Recent Campaign Activity

As of March 24, 2026, SmartApeSG was actively delivering four distinct malware payloads within a single infection session. The targeted host received Remcos RAT, NetSupport RAT, StealC, and Sectop RAT, also referred to as ArechClient2. This series of attacks underscores the strategic stacking of multiple malicious tools to inflict extensive harm through one user error.

The method involves injecting harmful scripts into already compromised but legitimate websites. Users visiting these sites are rerouted to a counterfeit CAPTCHA page, which appears to be a routine verification prompt but is actually designed to deceive users into executing a harmful script.

Malware Delivery Mechanism

Researchers from the Internet Storm Center documented the sequential payload delivery on March 24, 2026. The fake CAPTCHA page executes ClickFix instructions that clandestinely copy a malicious script into the user’s clipboard, prompting manual execution via the Windows Run dialog box. This sequence initiates an infection that operates covertly on the compromised machine.

The campaign’s impact is significant due to its layered approach, deploying multiple malware types. Remcos RAT activity was detected at 17:12 UTC, just a minute post-ClickFix execution. NetSupport RAT followed four minutes later, with StealC and Sectop RAT subsequently establishing connections to their respective command-and-control servers. This staggered deployment provides limited time for detection and mitigation before the full-scale infection takes root.

Stealth Techniques and Recommendations

SmartApeSG employs advanced techniques such as DLL side-loading to conceal malicious code. This involves embedding harmful DLL files within packages containing legitimate software, making detection difficult. NetSupport RAT, a genuine remote support tool, is manipulated to connect to attacker-controlled servers instead of trusted ones.

Network traffic analysis using tools like Wireshark reveals the distinct communications each malware strain establishes with its command-and-control server. The initial Remcos RAT download originates from urotypos[.]com, with the ClickFix script erasing traces post-execution, complicating forensic efforts.

Organizations are urged to block domains like urotypos[.]com and fresicrto[.]top at DNS and firewall levels while monitoring traffic towards specified IP addresses. Employee education on the risks of executing clipboard content prompted by websites is crucial. Security teams should also vigilantly monitor for unusual HTA file executions and DLL loading activities in common directories.

Stay informed by following us on Google News, LinkedIn, and X, and set CSN as your preferred source on Google for more updates.

Cyber Security News Tags:ClickFix, Cybersecurity, DLL side-loading, fake CAPTCHA, Internet Storm Center, Malware, NetSupport RAT, Remcos RAT, Sectop RAT, SmartApeSG, StealC

Post navigation

Previous Post: Pay2Key Linux Ransomware Targets Servers and Cloud Systems
Next Post: China-Linked Cyberattack Targets Southeast Asian Military

Related Posts

New Large-Scale Phishing Attacks Targets Hotelier Via Ads to Gain Access to Property Management Tools New Large-Scale Phishing Attacks Targets Hotelier Via Ads to Gain Access to Property Management Tools Cyber Security News
Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability Cyber Security News
Multiple Vulnerabilities in Anthropic Git MCP server Enables Code Execution Multiple Vulnerabilities in Anthropic Git MCP server Enables Code Execution Cyber Security News
Breachlock Named Sample Vendor for PTaaS and AEV in Two 2025 Gartner Reports Breachlock Named Sample Vendor for PTaaS and AEV in Two 2025 Gartner Reports Cyber Security News
Hackers Actively Exploiting ArrayOS AG VPN Vulnerability to Deploy Webshells Hackers Actively Exploiting ArrayOS AG VPN Vulnerability to Deploy Webshells Cyber Security News
New Fully Undetectable FUD Android RAT Hosted on GitHub New Fully Undetectable FUD Android RAT Hosted on GitHub Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mirai Botnets Escalate Global Cyber Threats
  • Stealthy Malware Campaign Utilizes VBS and Remote Trojans
  • China-Linked Cyberattack Targets Southeast Asian Military
  • SmartApeSG Campaign Exploits ClickFix for Malware Spread
  • Pay2Key Linux Ransomware Targets Servers and Cloud Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mirai Botnets Escalate Global Cyber Threats
  • Stealthy Malware Campaign Utilizes VBS and Remote Trojans
  • China-Linked Cyberattack Targets Southeast Asian Military
  • SmartApeSG Campaign Exploits ClickFix for Malware Spread
  • Pay2Key Linux Ransomware Targets Servers and Cloud Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark