Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Using New Matrix Push C2 to Deliver Malware and Phishing Attacks via Web Browser

Posted on November 21, 2025November 22, 2025 By CWS

A brand new command-and-control platform known as Matrix Push C2 has emerged as a critical menace to net customers throughout all working techniques.

This browser-based assault framework turns legit net browser options right into a weapon for delivering malware and phishing assaults.

Not like conventional malware that requires file downloads, Matrix Push C2 operates silently by way of a fileless assault technique, making it more durable to detect and cease.

The platform exploits net push notifications, a regular characteristic in trendy browsers, to determine direct communication channels with contaminated units.

Attackers use this connection to ship pretend system alerts, redirect customers to malicious web sites, monitor sufferer exercise in actual time, and even scan for cryptocurrency wallets.

The great thing about this assault from the cybercriminal’s perspective is that it bypasses many conventional safety instruments as a result of it seems to return from the browser itself somewhat than exterior malware.

Blackfog safety analysts recognized the malware’s subtle method to sufferer concentrating on and engagement.

The Matrix Push C2 dashboard offers attackers with detailed analytics exhibiting contaminated browsers, notification supply charges, and person interplay knowledge.

Matrix Push C2 marketing campaign dashboard (Supply – Blackfog)

With simply three check purchasers, the researchers noticed a one hundred pc supply success charge, demonstrating how efficient this assault vector might be at scale.

How the An infection Mechanism Works

The assault begins with social engineering. Attackers trick customers into permitting browser notifications by way of malicious or compromised web sites.

As soon as a person subscribes to those notifications, the attacker positive aspects a direct communication line to the sufferer’s desktop or cell gadget.

From that time ahead, the attacker can push out convincing pretend error messages and safety alerts that appear to be they arrive from trusted firms or the working system itself.

When customers click on these misleading notifications, they’re redirected to attacker-controlled web sites internet hosting phishing pages or malware downloads.

For instance, a pretend notification would possibly show “Replace required! Please replace Google Chrome to keep away from knowledge loss!” and direct customers to obtain trojanized software program.

The complete assault occurs by way of the browser’s notification system with out requiring conventional malware set up.

Cloudflare-style phishing notification instance (Supply – Blackfog)

What makes Matrix Push C2 notably harmful is its use of brand-themed phishing templates. The platform consists of pre-built templates mimicking PayPal, Netflix, Cloudflare, MetaMask, and different trusted providers.

Attackers can customise these templates to match official designs completely, exploiting person belief in acknowledged manufacturers.

Actual-time monitoring capabilities enable attackers to trace which notifications had been delivered, which customers clicked them, and collect useful gadget info, creating an entire assault orchestration platform.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacks, Browser, Deliver, Hackers, Malware, Matrix, Phishing, Push, Web

Post navigation

Previous Post: Operation DreamJob Attacking Manufacturing Industries Using Job-related WhatsApp Web Message
Next Post: North Korean Kimsuky and Lazarus Join Forces to Exploit Zero-Day Vulnerabilities Targeting Critical Sectors Worldwide

Related Posts

What Is Out-of-Bounds Read and Write Vulnerability? Cyber Security News
“CitrixBleed 2” Vulnerability PoC Released Cyber Security News
Crypto Developers Attacked With Malicious npm Packages to Steal Login Details Cyber Security News
Authorities Busted Ransomware Gang – Nine Laptops and 15 Mobile Devices Were Seized Cyber Security News
SonicWall Urges Customers to Reset Login Credentials After Configuration Backup Files Exposed Cyber Security News
Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark