Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Chrome Extension Crashes Browser in ClickFix Variant ‘CrashFix’

Malicious Chrome Extension Crashes Browser in ClickFix Variant ‘CrashFix’

Posted on January 19, 2026January 19, 2026 By CWS

A recent variant of the ClickFix assault depends on a malicious Chrome extension to show a safety warning and lure victims into executing undesirable instructions to put in malware, Huntress stories.

Dubbed CrashFix, the assault begins with the NexShield browser extension, which impersonates the reliable uBlock Origin Lite advert blocker.

The extension shows a pretend safety warning instructing the sufferer to repair allegedly recognized points by opening the Home windows Run dialogue and pasting content material from the clipboard.

Simply as within the basic ClickFix assaults, NexShield silently copies malicious PowerShell instructions to the clipboard, masquerading as a restore command, designed to contaminate the sufferer’s system with ModeloRAT.

Nevertheless, solely hosts which are domain-joined are contaminated, which means that the risk actor behind the marketing campaign, dubbed KongTuke and energetic since at the very least early 2025, is focusing on company environments.

The core malicious performance of NexShield, Huntress explains, is a denial-of-service (DoS) assault towards the sufferer’s browser, setting the stage for the CrashFix social engineering approach.

The extension executes a operate that makes an attempt to iterate 1 billion instances, making a chrome.runtime port reference to every iteration. As soon as it completes the iterations, it begins once more, in an infinite loop.Commercial. Scroll to proceed studying.

This exhausts system sources and causes the browser to turn into unresponsive and crash. If the browser is restarted, the pretend safety warning triggering the CrashFix assault is displayed.

To keep away from elevating person suspicion, NexShield units a timer in order that the malicious conduct is triggered 60 minutes after set up. The DoS assault begins 10 minutes later and is executed each 10 minutes, however solely towards customers for whom the extension has despatched a person ID to the command-and-control (C&C) server.

A deal with enterprise environments

The malicious command that victims run in a CrashFix assault results in the execution of the reliable Home windows utility Finger.exe, which might retrieve details about customers on distant methods.

The command additionally retrieves a secondary payload that fetches and executes malicious code from a distant server, putting in the fully-featured Python-based ModeloRAT distant entry trojan on domain-joined methods.

The RAT performs system reconnaissance, establishes persistence, and helps command execution. It additionally options adaptive C&C beaconing, obfuscation, two-layered encryption, and anti-analysis capabilities.

In line with Huntress, the malware operator seems targeted on compromising company environments to realize entry to Lively Listing, inside sources, and delicate knowledge. Thus, ModeloRAT will not be served to dwelling customers (an an infection mechanism for hosts that aren’t domain-joined has not been carried out in CrashFix).

“KongTuke’s CrashFix marketing campaign demonstrates how risk actors proceed to evolve their social engineering ways. By impersonating a trusted open-source venture (uBlock Origin Lite), crashing the person’s browser on function, after which providing a pretend repair, they’ve constructed a self-sustaining an infection loop that preys on person frustration,” Huntress notes.

Associated: Refined ClickFix Marketing campaign Focusing on Hospitality Sector

Associated: ClickFix Assaults Towards macOS Customers Evolving

Associated: Chrome Extensions With 900,000 Downloads Caught Stealing AI Chats

Associated: Chrome, Edge Extensions Caught Monitoring Customers, Creating Backdoors

Security Week News Tags:Browser, Chrome, ClickFix, Crashes, CrashFix, Extension, Malicious, Variant

Post navigation

Previous Post: 42,000 Impacted by Ingram Micro Ransomware Attack
Next Post: New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs

Related Posts

Threat Actor Infests Hotels With New RAT Threat Actor Infests Hotels With New RAT Security Week News
160,000 Impacted by Valsoft Data Breach 160,000 Impacted by Valsoft Data Breach Security Week News
Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) Security Week News
Fortra Patches Critical GoAnywhere MFT Vulnerability Fortra Patches Critical GoAnywhere MFT Vulnerability Security Week News
Irregular Raises  Million for AI Security Testing Lab Irregular Raises $80 Million for AI Security Testing Lab Security Week News
Microsoft Says Chinese APTs Exploited ToolShell Zero-Days Weeks Before Patch Microsoft Says Chinese APTs Exploited ToolShell Zero-Days Weeks Before Patch Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News