Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Beware of the New ‘Executive Award’ Campaign That Uses ClickFix to Deliver Stealerium Malware

Posted on December 3, 2025December 3, 2025 By CWS

A brand new and harmful phishing marketing campaign is focusing on organizations with a misleading “Govt Award” theme that mixes social engineering with superior malware supply.

This two-stage assault first tips customers into sharing their login credentials by way of a faux HTML type, then deploys the Stealerium info stealer to compromise affected techniques.

The marketing campaign represents a rising development the place attackers mix credential theft with malware infections in a single, coordinated operation.

The assault begins with a sophisticated HTML phishing web page titled “Digital-Reward-Card-Declare.html” that mimics a official company award notification.

Customers who work together with this web page consider they’re verifying their account credentials to say an government award, however as a substitute, their login info is instantly despatched to a Telegram command-and-control server managed by the attackers.

Award rip-off (Supply – X)

This credential harvesting section serves as the primary stage of the an infection chain.

SpiderLabs safety analysts recognized the malware after analyzing the marketing campaign’s infrastructure and assault patterns.

The researchers found that when a consumer falls for the phishing web page, a malicious SVG file named “account-verification-form.svg” is delivered within the second stage.

This file triggers a classy PowerShell script that operates by way of the ClickFix exploit chain, a recognized method that abuses Home windows messaging techniques to execute hidden instructions.

The PowerShell code then downloads and installs the Stealerium infostealer on the sufferer’s laptop with out the consumer’s information or consent.

Stealerium represents a severe risk as a result of it operates silently to extract delicate info from contaminated techniques.

The malware communicates with command-and-control servers at 31.57.147.77:6464 and makes use of a number of obtain endpoints to retrieve extra elements and instructions.

This structure permits attackers to adapt their assault in actual time primarily based on system circumstances and safety measures already in place.

Understanding the An infection Mechanism and PowerShell Execution

The assault’s power lies in the way it makes use of official Home windows options towards customers. When the malicious SVG file opens, the embedded PowerShell instructions execute with minimal visibility.

The ClickFix chain abuses official Home windows messaging protocols to set off the execution with out elevating typical safety alerts.

From there, Stealerium downloads extra elements, together with the principle DLL file, batch scripts, and command executables.

The malware then establishes persistence, guaranteeing it survives system restarts and continues stealing information. Organizations ought to monitor for uncommon PowerShell exercise, suspicious SVG file execution, and community connections to the recognized command-and-control infrastructure at 31.57.147.77:6464.

Endpoint detection techniques ought to be configured to flag makes an attempt to execute PowerShell instructions from non-standard sources.

Community monitoring ought to block entry to the recognized malicious IP addresses and look ahead to DNS requests related to this marketing campaign.

Customers ought to stay vigilant about unsolicited emails claiming government recognition or award notifications, as these stay efficient social engineering vectors.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Award, Beware, Campaign, ClickFix, Deliver, Executive, StealeriumMalware

Post navigation

Previous Post: Turning Disruptive Technology into a Strategic Advantage
Next Post: Microsoft Silently Mitigated Exploited LNK Vulnerability

Related Posts

Laundry Bear Infrastructure, Key Tactics and Procedures Uncovered Cyber Security News
AI-Powered Penetration Testing Platform Includes GPT-4 and Other AI Engine’s Cyber Security News
Cybersecurity Newsletter Weekly Recap – UK Hacker Bust to BMW Data Leak Cyber Security News
Meta Launches New Tools to Protect Messenger and WhatsApp Users from Scammers Cyber Security News
Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code Cyber Security News
DoJ Seizes $2.8 Million in Crypto From Zeppelin Ransomware Operators Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark