Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ClickFix Campaign Exploits Sites for MIMICRAT Deployment

New ClickFix Campaign Exploits Sites for MIMICRAT Deployment

Posted on February 20, 2026 By CWS

Cybersecurity experts have uncovered a sophisticated ClickFix campaign leveraging compromised legitimate websites to distribute a newly identified remote access trojan, MIMICRAT, also known as AstarionRAT. This campaign, which was detailed in a recent report by Elastic Security Labs, highlights the strategic use of varied industries and geographies as a delivery network for this malicious software.

Operational Sophistication Uncovered

The ClickFix campaign showcases a high degree of operational complexity. It utilizes a multi-stage PowerShell sequence to bypass Event Tracing for Windows (ETW) and Antimalware Scan Interface (AMSI) protections before deploying a Lua-scripted shellcode loader. The final payload communicates via HTTPS on port 443, emulating legitimate web analytics traffic.

MIMICRAT, developed in C++, includes capabilities for Windows token impersonation, SOCKS5 tunneling, and executing 22 distinct commands for post-exploitation activities. This campaign was identified earlier this month and shares tactical similarities with another ClickFix operation that utilizes the Matanbuchus 3.0 loader as a precursor for the same RAT, aiming at potential ransomware attacks or data theft.

Infection Pathway and Techniques

The infection process, as described by Elastic, begins with bincheck[.]io, a legitimate service for Bank Identification Number validation that was compromised to inject harmful JavaScript. This script loads an externally hosted PHP file, presenting a fake Cloudflare verification page. Victims are misled into executing a command in the Windows Run dialog, initiating a PowerShell command that connects to a command-and-control server.

This server then delivers a second-stage PowerShell script, which patches Windows event logging and antivirus scanning functions before deploying a Lua-based loader. The loader decrypts and executes in-memory shellcode, ultimately installing MIMICRAT. The trojan communicates with its control server over HTTPS, supporting a range of commands for system manipulation and network operations.

Global Reach and Targeting

The campaign’s lure content is dynamically localized in 17 different languages based on the victim’s browser settings, significantly expanding its reach. Documented victims include a university in the USA and numerous Chinese-speaking users, indicating the campaign’s broad and opportunistic targeting strategy.

Security researcher Salim Bitam noted the widespread nature of the campaign, emphasizing its potential impact across various sectors and regions. As cybersecurity teams work to understand and mitigate this threat, the importance of robust security measures and vigilance against such sophisticated campaigns is underscored.

In conclusion, the ClickFix campaign represents a significant threat with its advanced techniques and global targeting. Continued research and collaboration among cybersecurity professionals are essential to countering these evolving threats.

The Hacker News Tags:ClickFix, Cybersecurity, data exfiltration, HTTPS, Malware, MIMICRAT, PowerShell, Ransomware, RAT, threat intelligence

Post navigation

Previous Post: Python-Based Malware Targets Windows for Credential Theft
Next Post: Jenkins Security Flaws Pose Major XSS Threats

Related Posts

Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell The Hacker News
Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads The Hacker News
Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid The Hacker News
Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities The Hacker News
How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines The Hacker News
MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News