Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ClickFix Campaign Exploits Sites for MIMICRAT Deployment

New ClickFix Campaign Exploits Sites for MIMICRAT Deployment

Posted on February 20, 2026 By CWS

Cybersecurity experts have uncovered a sophisticated ClickFix campaign leveraging compromised legitimate websites to distribute a newly identified remote access trojan, MIMICRAT, also known as AstarionRAT. This campaign, which was detailed in a recent report by Elastic Security Labs, highlights the strategic use of varied industries and geographies as a delivery network for this malicious software.

Operational Sophistication Uncovered

The ClickFix campaign showcases a high degree of operational complexity. It utilizes a multi-stage PowerShell sequence to bypass Event Tracing for Windows (ETW) and Antimalware Scan Interface (AMSI) protections before deploying a Lua-scripted shellcode loader. The final payload communicates via HTTPS on port 443, emulating legitimate web analytics traffic.

MIMICRAT, developed in C++, includes capabilities for Windows token impersonation, SOCKS5 tunneling, and executing 22 distinct commands for post-exploitation activities. This campaign was identified earlier this month and shares tactical similarities with another ClickFix operation that utilizes the Matanbuchus 3.0 loader as a precursor for the same RAT, aiming at potential ransomware attacks or data theft.

Infection Pathway and Techniques

The infection process, as described by Elastic, begins with bincheck[.]io, a legitimate service for Bank Identification Number validation that was compromised to inject harmful JavaScript. This script loads an externally hosted PHP file, presenting a fake Cloudflare verification page. Victims are misled into executing a command in the Windows Run dialog, initiating a PowerShell command that connects to a command-and-control server.

This server then delivers a second-stage PowerShell script, which patches Windows event logging and antivirus scanning functions before deploying a Lua-based loader. The loader decrypts and executes in-memory shellcode, ultimately installing MIMICRAT. The trojan communicates with its control server over HTTPS, supporting a range of commands for system manipulation and network operations.

Global Reach and Targeting

The campaign’s lure content is dynamically localized in 17 different languages based on the victim’s browser settings, significantly expanding its reach. Documented victims include a university in the USA and numerous Chinese-speaking users, indicating the campaign’s broad and opportunistic targeting strategy.

Security researcher Salim Bitam noted the widespread nature of the campaign, emphasizing its potential impact across various sectors and regions. As cybersecurity teams work to understand and mitigate this threat, the importance of robust security measures and vigilance against such sophisticated campaigns is underscored.

In conclusion, the ClickFix campaign represents a significant threat with its advanced techniques and global targeting. Continued research and collaboration among cybersecurity professionals are essential to countering these evolving threats.

The Hacker News Tags:ClickFix, Cybersecurity, data exfiltration, HTTPS, Malware, MIMICRAT, PowerShell, Ransomware, RAT, threat intelligence

Post navigation

Previous Post: Python-Based Malware Targets Windows for Credential Theft
Next Post: Jenkins Security Flaws Pose Major XSS Threats

Related Posts

CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks The Hacker News
Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft The Hacker News
0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves The Hacker News
New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit The Hacker News
Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data The Hacker News
U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How Fiber Optic Cables Can Secretly Eavesdrop on Conversations
  • Iran-Linked Cyberattacks Disrupt US Infrastructure
  • Hackers Exploit Npm Package to Target AI Developers
  • Kubernetes Misconfigurations Enable Dangerous Cloud Exploits
  • BPFDoor Variants Evade Detection Using Stateless C2

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How Fiber Optic Cables Can Secretly Eavesdrop on Conversations
  • Iran-Linked Cyberattacks Disrupt US Infrastructure
  • Hackers Exploit Npm Package to Target AI Developers
  • Kubernetes Misconfigurations Enable Dangerous Cloud Exploits
  • BPFDoor Variants Evade Detection Using Stateless C2

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark