Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Lampion Banking Malware Employs ClickFix Lures To Steal Banking Information

Lampion Banking Malware Employs ClickFix Lures To Steal Banking Information

Posted on May 7, 2025May 9, 2025 By CWS

A classy banking trojan generally known as Lampion has resurfaced with an advanced assault technique, now exploiting faux ClickFix utility lures to reap delicate banking credentials from unsuspecting victims.

This banking malware, first recognized in late 2019, has undergone important modifications to boost its effectiveness in compromising monetary knowledge throughout a number of European banking establishments.

The most recent marketing campaign demonstrates the malware operators’ continued adaptation and refinement of social engineering strategies to maximise an infection charges.

The present distribution technique leverages fraudulent emails impersonating legit software program replace companies, particularly mimicking a fictitious utility referred to as “ClickFix” that purportedly resolves browser compatibility points.

These phishing emails comprise malicious attachments or hyperlinks directing victims to obtain what seems to be a browser restore software, however as a substitute delivers the Lampion payload.

As soon as executed, the malware begins its covert operation to reap banking credentials, bank card info, and different delicate monetary knowledge from compromised techniques.

Palo Alto Networks researchers recognized this new variant after observing a big spike in associated an infection makes an attempt throughout a number of nations.

Their evaluation revealed subtle obfuscation strategies designed to bypass conventional safety options whereas sustaining persistent entry to contaminated techniques.

In line with their findings, the marketing campaign primarily targets banking prospects in Portugal, Spain, and different European areas with personalized lures in numerous languages.

Impression of this marketing campaign

The monetary impression of this marketing campaign has been substantial, with quite a few victims reporting unauthorized transactions following an infection.

Banking establishments have been compelled to implement extra safety measures whereas working with cybersecurity groups to mitigate ongoing threats.

The widespread nature of those assaults highlights the persevering with evolution of economic malware as a persistent menace to each particular person customers and monetary organizations.

Lampion’s ClickFix an infection chain (Supply – Plao Alto Networks)

The an infection chain begins when customers obtain the faux ClickFix utility, which executes a extremely obfuscated VBScript that establishes persistence by registry modifications.

The script, proven under, creates an preliminary foothold earlier than downloading extra elements:-

Set WshShell = CreateObject(“WScript.Shell”)
strRegPath = “HKCUSoftwareMicrosoftWindowsCurrentVersionRun”
WshShell.RegWrite strRegPath & “ClickFixUpdate”, “wscript.exe //B ” & “””” & CreateObject(“WScript.Shell”).ExpandEnvironmentStrings(“%TEMP%”) & “updater.vbs” & “”””, “REG_SZ”

This stage-one loader communicates with command and management servers to retrieve the first Lampion payload.

The malware then deploys superior hooking strategies to intercept banking periods whereas remaining undetected.

Are you from the SOC and DFIR Groups? – Analyse Actual time Malware Incidents with ANY.RUN -> Begin Now for Free.

Cyber Security News Tags:Banking, ClickFix, Employs, Information, Lampion, Lures, Malware, Steal

Post navigation

Previous Post: CodeAnt AI Raises $2 Million for Code Quality and Application Security Platform 
Next Post: Cisco’s Quantum Bet: Linking Small Machines Into One Giant Quantum Computer

Related Posts

Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware Cyber Security News
Microsoft 365 Outage Blocks Access to Teams, Exchange Online, and Admin Center Microsoft 365 Outage Blocks Access to Teams, Exchange Online, and Admin Center Cyber Security News
Beware of Fake AI Business Tools That Hides Ransomware Beware of Fake AI Business Tools That Hides Ransomware Cyber Security News
Microsoft Exchange Online Misidentifies Emails as Phishing Microsoft Exchange Online Misidentifies Emails as Phishing Cyber Security News
Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User Cyber Security News
Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News