Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Beware of the New ‘Executive Award’ Campaign That Uses ClickFix to Deliver Stealerium Malware

Posted on December 3, 2025December 3, 2025 By CWS

A brand new and harmful phishing marketing campaign is focusing on organizations with a misleading “Govt Award” theme that mixes social engineering with superior malware supply.

This two-stage assault first tips customers into sharing their login credentials by way of a faux HTML type, then deploys the Stealerium info stealer to compromise affected techniques.

The marketing campaign represents a rising development the place attackers mix credential theft with malware infections in a single, coordinated operation.

The assault begins with a sophisticated HTML phishing web page titled “Digital-Reward-Card-Declare.html” that mimics a official company award notification.

Customers who work together with this web page consider they’re verifying their account credentials to say an government award, however as a substitute, their login info is instantly despatched to a Telegram command-and-control server managed by the attackers.

Award rip-off (Supply – X)

This credential harvesting section serves as the primary stage of the an infection chain.

SpiderLabs safety analysts recognized the malware after analyzing the marketing campaign’s infrastructure and assault patterns.

The researchers found that when a consumer falls for the phishing web page, a malicious SVG file named “account-verification-form.svg” is delivered within the second stage.

This file triggers a classy PowerShell script that operates by way of the ClickFix exploit chain, a recognized method that abuses Home windows messaging techniques to execute hidden instructions.

The PowerShell code then downloads and installs the Stealerium infostealer on the sufferer’s laptop with out the consumer’s information or consent.

Stealerium represents a severe risk as a result of it operates silently to extract delicate info from contaminated techniques.

The malware communicates with command-and-control servers at 31.57.147.77:6464 and makes use of a number of obtain endpoints to retrieve extra elements and instructions.

This structure permits attackers to adapt their assault in actual time primarily based on system circumstances and safety measures already in place.

Understanding the An infection Mechanism and PowerShell Execution

The assault’s power lies in the way it makes use of official Home windows options towards customers. When the malicious SVG file opens, the embedded PowerShell instructions execute with minimal visibility.

The ClickFix chain abuses official Home windows messaging protocols to set off the execution with out elevating typical safety alerts.

From there, Stealerium downloads extra elements, together with the principle DLL file, batch scripts, and command executables.

The malware then establishes persistence, guaranteeing it survives system restarts and continues stealing information. Organizations ought to monitor for uncommon PowerShell exercise, suspicious SVG file execution, and community connections to the recognized command-and-control infrastructure at 31.57.147.77:6464.

Endpoint detection techniques ought to be configured to flag makes an attempt to execute PowerShell instructions from non-standard sources.

Community monitoring ought to block entry to the recognized malicious IP addresses and look ahead to DNS requests related to this marketing campaign.

Customers ought to stay vigilant about unsolicited emails claiming government recognition or award notifications, as these stay efficient social engineering vectors.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Award, Beware, Campaign, ClickFix, Deliver, Executive, StealeriumMalware

Post navigation

Previous Post: Turning Disruptive Technology into a Strategic Advantage
Next Post: Microsoft Silently Mitigated Exploited LNK Vulnerability

Related Posts

Blockchain Security – Protecting Decentralized Applications Cyber Security News
Hacktivist Group Claimed Attacks Across 20+ Critical Sectors Following Iran–Israel Conflict Cyber Security News
Dead Man’s Switch – Widespread npm Supply Chain Attack Driving Malware Attacks Cyber Security News
Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution Cyber Security News
HubSpot’s Jinjava Engine Vulnerability Exposes Thousands of Websites to RCE Attacks Cyber Security News
SonicOS SSLVPN Vulnerability Let Attackers Crash the Firewall Remotely Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark