Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ClickFake Interview Attack Using ClickFix Technique to Deliver GolangGhost Malware

New ClickFake Interview Attack Using ClickFix Technique to Deliver GolangGhost Malware

Posted on July 22, 2025July 22, 2025 By CWS

The Lazarus Group’s long-running recruitment lure has resurfaced as “ClickFake Interview”, anchored on the freshly registered waventic[.]com web site.

Candidates progress via a slick JavaScript type that ends with a bogus webcam “driver” obtain, really planting the cross-platform GolangGhost malware.

Sekoia.io threat-defence researchers famous that the operators recycled the “ClickFix” internet template first profiled in March 2025, however have now built-in geolocation filters and CAPTCHA to discourage informal scanning.

The analysts traced greater than forty companion domains spawned since April, all funnelling site visitors towards apply[.]waventic[.]com earlier than serving a statically linked Go binary compiled for Home windows, Linux and macOS.

Lure web site (Supply – Sekoia)

The reinvigorated social engineering loop leverages stolen LinkedIn profiles and Telegram channels to look professional, then abuses browser push-notifications to immediate the file switch.

As soon as executed, GolangGhost instantly contacts hard-coded C2 endpoints over TLS-wrapped WebSockets, exporting a full stock of working processes and OS-level metadata inside seconds.

Early telemetry exhibits finance and blockchain start-ups in Europe and Southeast Asia among the many first victims, with a number of macOS arm64 hosts already leaking credential vaults.

Delivered as a self-contained Go executable, the pattern usually bypasses signature-based antivirus engines that deal with it as benign construct output.

An infection mechanism

At launch GolangGhost drops a per-user copy into the OS-specific autostart listing and registers persistence keys named “SysDrvX %RAND%”.

The binary’s minimal footprint stems from dynamic module loading, most capabilities are fetched on demand by way of base64-encoded gRPC blobs.

The next excerpt, recovered throughout sandboxing, exhibits the loader decompressing its plugin bundle:-

blob, _ := base64.StdEncoding.DecodeString(pkg)
r, _ := zlib.NewReader(bytes.NewReader(blob))
io.Copy(os.TempDir()+”/”+modName, r)
cmd := exec.Command(os.TempDir()+”/”+modName, “-m”, “init”)
cmd.Begin()

Safety groups ought to monitor outbound WebSocket site visitors to unfamiliar domains and flag Go executables spawning shell processes outdoors the consumer profile.

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now

Cyber Security News Tags:Attack, ClickFake, ClickFix, Deliver, GolangGhost, Interview, Malware, Technique

Post navigation

Previous Post: Microsoft Says Chinese APTs Exploited ToolShell Zero-Days Weeks Before Patch
Next Post: Quid Miner Launches Mobile App to Unlock in Daily Cloud Mining Income for BTC, DOGE, and XRP for Investors

Related Posts

Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys Cyber Security News
Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks Cyber Security News
Sweet Security Named Cloud Security Leader and CADR Leader in Latio Cloud Security Report Sweet Security Named Cloud Security Leader and CADR Leader in Latio Cloud Security Report Cyber Security News
Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors Cyber Security News
CISA Releases Two Advisories Covering Vulnerabilities, and Exploits Surrounding ICS CISA Releases Two Advisories Covering Vulnerabilities, and Exploits Surrounding ICS Cyber Security News
Hackers Allegedly Destroyed Aeroflot Airlines’ IT Infrastructure in Year-Long Attack Hackers Allegedly Destroyed Aeroflot Airlines’ IT Infrastructure in Year-Long Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News