Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lampion Banking Malware Employs ClickFix Lures To Steal Banking Information

Posted on May 7, 2025May 9, 2025 By CWS

A classy banking trojan generally known as Lampion has resurfaced with an advanced assault technique, now exploiting faux ClickFix utility lures to reap delicate banking credentials from unsuspecting victims.

This banking malware, first recognized in late 2019, has undergone important modifications to boost its effectiveness in compromising monetary knowledge throughout a number of European banking establishments.

The most recent marketing campaign demonstrates the malware operators’ continued adaptation and refinement of social engineering strategies to maximise an infection charges.

The present distribution technique leverages fraudulent emails impersonating legit software program replace companies, particularly mimicking a fictitious utility referred to as “ClickFix” that purportedly resolves browser compatibility points.

These phishing emails comprise malicious attachments or hyperlinks directing victims to obtain what seems to be a browser restore software, however as a substitute delivers the Lampion payload.

As soon as executed, the malware begins its covert operation to reap banking credentials, bank card info, and different delicate monetary knowledge from compromised techniques.

Palo Alto Networks researchers recognized this new variant after observing a big spike in associated an infection makes an attempt throughout a number of nations.

Their evaluation revealed subtle obfuscation strategies designed to bypass conventional safety options whereas sustaining persistent entry to contaminated techniques.

In line with their findings, the marketing campaign primarily targets banking prospects in Portugal, Spain, and different European areas with personalized lures in numerous languages.

Impression of this marketing campaign

The monetary impression of this marketing campaign has been substantial, with quite a few victims reporting unauthorized transactions following an infection.

Banking establishments have been compelled to implement extra safety measures whereas working with cybersecurity groups to mitigate ongoing threats.

The widespread nature of those assaults highlights the persevering with evolution of economic malware as a persistent menace to each particular person customers and monetary organizations.

Lampion’s ClickFix an infection chain (Supply – Plao Alto Networks)

The an infection chain begins when customers obtain the faux ClickFix utility, which executes a extremely obfuscated VBScript that establishes persistence by registry modifications.

The script, proven under, creates an preliminary foothold earlier than downloading extra elements:-

Set WshShell = CreateObject(“WScript.Shell”)
strRegPath = “HKCUSoftwareMicrosoftWindowsCurrentVersionRun”
WshShell.RegWrite strRegPath & “ClickFixUpdate”, “wscript.exe //B ” & “””” & CreateObject(“WScript.Shell”).ExpandEnvironmentStrings(“%TEMP%”) & “updater.vbs” & “”””, “REG_SZ”

This stage-one loader communicates with command and management servers to retrieve the first Lampion payload.

The malware then deploys superior hooking strategies to intercept banking periods whereas remaining undetected.

Are you from the SOC and DFIR Groups? – Analyse Actual time Malware Incidents with ANY.RUN -> Begin Now for Free.

Cyber Security News Tags:Banking, ClickFix, Employs, Information, Lampion, Lures, Malware, Steal

Post navigation

Previous Post: CodeAnt AI Raises $2 Million for Code Quality and Application Security Platform 
Next Post: Cisco’s Quantum Bet: Linking Small Machines Into One Giant Quantum Computer

Related Posts

UAT-638 Hackers Exploit Cityworks Zero-Day to Attack IIS Servers With VSHell Malware Cyber Security News
MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials Cyber Security News
Critical Android System Component Vulnerability Let Attackers Execute Remote Code without User Interaction Cyber Security News
Deep Dive into Endpoint Security Cyber Security News
Hackers Compromise Intelligence Website Used by CIA and Other Agencies Cyber Security News
New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Seemplicity Raises $50 Million for Exposure Management Platform
  • Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do
  • Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
  • RingReaper Malware Attacking Linux Servers Evading EDR Solutions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Seemplicity Raises $50 Million for Exposure Management Platform
  • Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do
  • Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
  • RingReaper Malware Attacking Linux Servers Evading EDR Solutions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News