Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lampion Banking Malware Employs ClickFix Lures To Steal Banking Information

Posted on May 7, 2025May 9, 2025 By CWS

A classy banking trojan generally known as Lampion has resurfaced with an advanced assault technique, now exploiting faux ClickFix utility lures to reap delicate banking credentials from unsuspecting victims.

This banking malware, first recognized in late 2019, has undergone important modifications to boost its effectiveness in compromising monetary knowledge throughout a number of European banking establishments.

The most recent marketing campaign demonstrates the malware operators’ continued adaptation and refinement of social engineering strategies to maximise an infection charges.

The present distribution technique leverages fraudulent emails impersonating legit software program replace companies, particularly mimicking a fictitious utility referred to as “ClickFix” that purportedly resolves browser compatibility points.

These phishing emails comprise malicious attachments or hyperlinks directing victims to obtain what seems to be a browser restore software, however as a substitute delivers the Lampion payload.

As soon as executed, the malware begins its covert operation to reap banking credentials, bank card info, and different delicate monetary knowledge from compromised techniques.

Palo Alto Networks researchers recognized this new variant after observing a big spike in associated an infection makes an attempt throughout a number of nations.

Their evaluation revealed subtle obfuscation strategies designed to bypass conventional safety options whereas sustaining persistent entry to contaminated techniques.

In line with their findings, the marketing campaign primarily targets banking prospects in Portugal, Spain, and different European areas with personalized lures in numerous languages.

Impression of this marketing campaign

The monetary impression of this marketing campaign has been substantial, with quite a few victims reporting unauthorized transactions following an infection.

Banking establishments have been compelled to implement extra safety measures whereas working with cybersecurity groups to mitigate ongoing threats.

The widespread nature of those assaults highlights the persevering with evolution of economic malware as a persistent menace to each particular person customers and monetary organizations.

Lampion’s ClickFix an infection chain (Supply – Plao Alto Networks)

The an infection chain begins when customers obtain the faux ClickFix utility, which executes a extremely obfuscated VBScript that establishes persistence by registry modifications.

The script, proven under, creates an preliminary foothold earlier than downloading extra elements:-

Set WshShell = CreateObject(“WScript.Shell”)
strRegPath = “HKCUSoftwareMicrosoftWindowsCurrentVersionRun”
WshShell.RegWrite strRegPath & “ClickFixUpdate”, “wscript.exe //B ” & “””” & CreateObject(“WScript.Shell”).ExpandEnvironmentStrings(“%TEMP%”) & “updater.vbs” & “”””, “REG_SZ”

This stage-one loader communicates with command and management servers to retrieve the first Lampion payload.

The malware then deploys superior hooking strategies to intercept banking periods whereas remaining undetected.

Are you from the SOC and DFIR Groups? – Analyse Actual time Malware Incidents with ANY.RUN -> Begin Now for Free.

Cyber Security News Tags:Banking, ClickFix, Employs, Information, Lampion, Lures, Malware, Steal

Post navigation

Previous Post: CodeAnt AI Raises $2 Million for Code Quality and Application Security Platform 
Next Post: Cisco’s Quantum Bet: Linking Small Machines Into One Giant Quantum Computer

Related Posts

New Rust-based InfoStealer via Fake CAPTCHA Delivers EDDIESTEALER Cyber Security News
Google to Remove Two Certificate Authorities from Chrome Root Store Cyber Security News
Earth Ammit Hackers Attacking Using New Tools to Attack Drones Used in Military Sectors Cyber Security News
New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks Cyber Security News
China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure Cyber Security News
Record Breaking 7.3 Tbps DDoS Attack Blasting 37.4 Terabytes in Just 45 Seconds Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News