Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Malicious Chrome Extension Crashes Browser in ClickFix Variant ‘CrashFix’

Posted on January 19, 2026January 19, 2026 By CWS

A recent variant of the ClickFix assault depends on a malicious Chrome extension to show a safety warning and lure victims into executing undesirable instructions to put in malware, Huntress stories.

Dubbed CrashFix, the assault begins with the NexShield browser extension, which impersonates the reliable uBlock Origin Lite advert blocker.

The extension shows a pretend safety warning instructing the sufferer to repair allegedly recognized points by opening the Home windows Run dialogue and pasting content material from the clipboard.

Simply as within the basic ClickFix assaults, NexShield silently copies malicious PowerShell instructions to the clipboard, masquerading as a restore command, designed to contaminate the sufferer’s system with ModeloRAT.

Nevertheless, solely hosts which are domain-joined are contaminated, which means that the risk actor behind the marketing campaign, dubbed KongTuke and energetic since at the very least early 2025, is focusing on company environments.

The core malicious performance of NexShield, Huntress explains, is a denial-of-service (DoS) assault towards the sufferer’s browser, setting the stage for the CrashFix social engineering approach.

The extension executes a operate that makes an attempt to iterate 1 billion instances, making a chrome.runtime port reference to every iteration. As soon as it completes the iterations, it begins once more, in an infinite loop.Commercial. Scroll to proceed studying.

This exhausts system sources and causes the browser to turn into unresponsive and crash. If the browser is restarted, the pretend safety warning triggering the CrashFix assault is displayed.

To keep away from elevating person suspicion, NexShield units a timer in order that the malicious conduct is triggered 60 minutes after set up. The DoS assault begins 10 minutes later and is executed each 10 minutes, however solely towards customers for whom the extension has despatched a person ID to the command-and-control (C&C) server.

A deal with enterprise environments

The malicious command that victims run in a CrashFix assault results in the execution of the reliable Home windows utility Finger.exe, which might retrieve details about customers on distant methods.

The command additionally retrieves a secondary payload that fetches and executes malicious code from a distant server, putting in the fully-featured Python-based ModeloRAT distant entry trojan on domain-joined methods.

The RAT performs system reconnaissance, establishes persistence, and helps command execution. It additionally options adaptive C&C beaconing, obfuscation, two-layered encryption, and anti-analysis capabilities.

In line with Huntress, the malware operator seems targeted on compromising company environments to realize entry to Lively Listing, inside sources, and delicate knowledge. Thus, ModeloRAT will not be served to dwelling customers (an an infection mechanism for hosts that aren’t domain-joined has not been carried out in CrashFix).

“KongTuke’s CrashFix marketing campaign demonstrates how risk actors proceed to evolve their social engineering ways. By impersonating a trusted open-source venture (uBlock Origin Lite), crashing the person’s browser on function, after which providing a pretend repair, they’ve constructed a self-sustaining an infection loop that preys on person frustration,” Huntress notes.

Associated: Refined ClickFix Marketing campaign Focusing on Hospitality Sector

Associated: ClickFix Assaults Towards macOS Customers Evolving

Associated: Chrome Extensions With 900,000 Downloads Caught Stealing AI Chats

Associated: Chrome, Edge Extensions Caught Monitoring Customers, Creating Backdoors

Security Week News Tags:Browser, Chrome, ClickFix, Crashes, CrashFix, Extension, Malicious, Variant

Post navigation

Previous Post: 42,000 Impacted by Ingram Micro Ransomware Attack
Next Post: New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs

Related Posts

New ‘Reprompt’ Attack Silently Siphons Microsoft Copilot Data Security Week News
Apple Patches 19 WebKit Vulnerabilities  Security Week News
Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data  Security Week News
Exploits, Technical Details Released for CitrixBleed2 Vulnerability Security Week News
Cisco Patches Zero-Day Flaw Affecting Routers and Switches Security Week News
Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • TP-Link Patches Vulnerability Exposing VIGI Cameras to Remote Hacking
  • Jordanian Admits in US Court to Selling Access to 50 Enterprise Networks
  • Free Converter Apps that Convert your Clean System to Infected in Seconds
  • Fortinet Exploits, RedLine Clipjack, NTLM Crack, Copilot Attack & More
  • Ukraine Police Exposed Russian Hacker Group Specializes in Ransomware Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • TP-Link Patches Vulnerability Exposing VIGI Cameras to Remote Hacking
  • Jordanian Admits in US Court to Selling Access to 50 Enterprise Networks
  • Free Converter Apps that Convert your Clean System to Infected in Seconds
  • Fortinet Exploits, RedLine Clipjack, NTLM Crack, Copilot Attack & More
  • Ukraine Police Exposed Russian Hacker Group Specializes in Ransomware Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark