Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lampion Banking Malware Employs ClickFix Lures To Steal Banking Information

Posted on May 7, 2025May 9, 2025 By CWS

A classy banking trojan generally known as Lampion has resurfaced with an advanced assault technique, now exploiting faux ClickFix utility lures to reap delicate banking credentials from unsuspecting victims.

This banking malware, first recognized in late 2019, has undergone important modifications to boost its effectiveness in compromising monetary knowledge throughout a number of European banking establishments.

The most recent marketing campaign demonstrates the malware operators’ continued adaptation and refinement of social engineering strategies to maximise an infection charges.

The present distribution technique leverages fraudulent emails impersonating legit software program replace companies, particularly mimicking a fictitious utility referred to as “ClickFix” that purportedly resolves browser compatibility points.

These phishing emails comprise malicious attachments or hyperlinks directing victims to obtain what seems to be a browser restore software, however as a substitute delivers the Lampion payload.

As soon as executed, the malware begins its covert operation to reap banking credentials, bank card info, and different delicate monetary knowledge from compromised techniques.

Palo Alto Networks researchers recognized this new variant after observing a big spike in associated an infection makes an attempt throughout a number of nations.

Their evaluation revealed subtle obfuscation strategies designed to bypass conventional safety options whereas sustaining persistent entry to contaminated techniques.

In line with their findings, the marketing campaign primarily targets banking prospects in Portugal, Spain, and different European areas with personalized lures in numerous languages.

Impression of this marketing campaign

The monetary impression of this marketing campaign has been substantial, with quite a few victims reporting unauthorized transactions following an infection.

Banking establishments have been compelled to implement extra safety measures whereas working with cybersecurity groups to mitigate ongoing threats.

The widespread nature of those assaults highlights the persevering with evolution of economic malware as a persistent menace to each particular person customers and monetary organizations.

Lampion’s ClickFix an infection chain (Supply – Plao Alto Networks)

The an infection chain begins when customers obtain the faux ClickFix utility, which executes a extremely obfuscated VBScript that establishes persistence by registry modifications.

The script, proven under, creates an preliminary foothold earlier than downloading extra elements:-

Set WshShell = CreateObject(“WScript.Shell”)
strRegPath = “HKCUSoftwareMicrosoftWindowsCurrentVersionRun”
WshShell.RegWrite strRegPath & “ClickFixUpdate”, “wscript.exe //B ” & “””” & CreateObject(“WScript.Shell”).ExpandEnvironmentStrings(“%TEMP%”) & “updater.vbs” & “”””, “REG_SZ”

This stage-one loader communicates with command and management servers to retrieve the first Lampion payload.

The malware then deploys superior hooking strategies to intercept banking periods whereas remaining undetected.

Are you from the SOC and DFIR Groups? – Analyse Actual time Malware Incidents with ANY.RUN -> Begin Now for Free.

Cyber Security News Tags:Banking, ClickFix, Employs, Information, Lampion, Lures, Malware, Steal

Post navigation

Previous Post: CodeAnt AI Raises $2 Million for Code Quality and Application Security Platform 
Next Post: Cisco’s Quantum Bet: Linking Small Machines Into One Giant Quantum Computer

Related Posts

PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution Cyber Security News
Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media Cyber Security News
Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits Cyber Security News
Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code Cyber Security News
Earth Ammit Hackers Attacking Using New Tools to Attack Drones Used in Military Sectors Cyber Security News
72 Vulnerabilities Fixed, Including 5 Actively Exploited Zero-Days Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News