Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Hackers use Tiktok videos to distribute Widar and Crealc Malsware by Clickfix technique

May 23, 2025

Vicoviodtrap uses the lack of Cisco to create global Honeypot with 5300 compromised devices

May 23, 2025

300 servers and € 3.5 million, confiscated when Europe Strikes Ransomwark Networks worldwide

May 23, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Hackers use Tiktok videos to distribute Widar and Crealc Malsware by Clickfix technique
Global Security

Hackers use Tiktok videos to distribute Widar and Crealc Malsware by Clickfix technique

AdminBy AdminMay 23, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Malicious software known as Latrodectus became the last who accepted the widely used social engineering technique called Clickfix as a distribution vector.

” Technique Clickfix Particularly risky because it allows malicious software to perform memory rather than writing to the disk, ” – said the Exel in a report that is shared with Hacker News.

Latrodectus, which is believed to be the successor of ICEDID, is the name given to malicious software that acts as a bootler for other useful loads such as redemption. It was first recorded by Profpoint and Team Cymru in April 2024.

Incidentally, malicious software – one of the many malware affected by operational failure within the ENDGAME operation that remove 300 servers worldwide and neutralized 650 bumblebee domains, Lactrodectus, QAKBOT, Hijackloader, Danabot, Trickbot and Warmcookie between May 19 and 22, 2025.

Cybersecurity

In the latest set of Latrodectus attacks, which is observed by Expel in May 2025, unanswered users are deceived by copying and executing the PowerShell team from the infected site, a tactic that has become a widespread method of distributing malicious programs.

“When using users, these commands will try to install a file located on a remote URL using MSIEXEC and then execute it in memory,” the Eccal said. “This prevents the attacker from writing a file on a computer and a risk that is manifested by a browser or antivirus that can detect it on the disk.”

The MSI installer contains a legitimate application from NVIDIA, used to download malicious DLL, which then uses CURL to download the main useful load.

To mitigate the attacks of this type, it is recommended to disable the Windows Run program using group policy facilities (GPO) or exclude the “Windows + R” hot key by changing the Windows Registry.

From Clickfix to Tiktok

Disclosure occurs when Trend Micro discovered details of a new engineering company, which instead of leaning on fake CAPTCHA pages, use Tiktok videos that are probably generated using artificial intelligence tools (AI) to deliver Vidar and theft information, instructing users to manage from wicked commands, Microsoft Office, Capcut and Spotify.

These videos were posted from different Tiktok accounts such as @gitallowed, @zane.houghton, @allaivo2, @sysglow.wow, @alexfixpc and @digitaldreams771. These accounts are no longer active. One of the videos claiming to provide instructions as “instantly increased its Spotify experience” scored almost 500,000 views, with more than 20,000 likes and more than 100 comments.

The company notes ClickFix’s new escalation in that users looking for methods of activation of pirate applications are verbally and visually managed to open the Windows Run dialog by clicking on “Windows + R” Hot Key, run PowerShell and launch the team allocated in the video.

“Actors threatens now use Tiktok videos that are potentially generated using tools running on AI – Note.

Cybersecurity

“This company emphasizes how the attackers are ready to arm what the platforms in social media are currently popular for distributing malware.”

Fake Applications for Books used to steal seed phrases Mac

The resulting data also follows from the opening of four different malware that use the cloned version of the Live Live app to steal sensitive data, including seed phrases, to drain wallets from the cryptocurrencies of the victims. Activities continues Since August 2024.

Attacks use malicious DMG files that run Applescript for password exports and Apple Notes data, and then load the Training version of Ledger Live. Once the application is open, it warns users about the alleged account problem and that requires their seed phrase. The entered seminal phrase is sent to the server controlled attacker.

Moonlock lab that shed light on the company, stated disclosed from Jamf this month.

“The dark internet forums of the chatter around the Ledger schemes are growing. The next wave is already being developed,” the MacPaw Cybersecurity Department noted. “Hackers will continue to use the Trust CryPt owners in Ledger Live.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Vicoviodtrap uses the lack of Cisco to create global Honeypot with 5300 compromised devices

May 23, 2025

300 servers and € 3.5 million, confiscated when Europe Strikes Ransomwark Networks worldwide

May 23, 2025

Firewall web applications with open source with zero day detection and bot protection

May 23, 2025

The US Demonrates Danabot Malf

May 23, 2025

Duo Gitlab’s vulnerability allowed the attackers to steal AI with hidden tips

May 23, 2025

CISA warns of suspicion of extensive Saas attacks that exploit app secrets and incorrect cloud settings

May 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Hackers use Tiktok videos to distribute Widar and Crealc Malsware by Clickfix technique

May 23, 2025

Vicoviodtrap uses the lack of Cisco to create global Honeypot with 5300 compromised devices

May 23, 2025

300 servers and € 3.5 million, confiscated when Europe Strikes Ransomwark Networks worldwide

May 23, 2025

Firewall web applications with open source with zero day detection and bot protection

May 23, 2025

The US Demonrates Danabot Malf

May 23, 2025

Duo Gitlab’s vulnerability allowed the attackers to steal AI with hidden tips

May 23, 2025

CISA warns of suspicion of extensive Saas attacks that exploit app secrets and incorrect cloud settings

May 23, 2025

Chinese hackers operate the shortage of CityWorks Trimble to penetrate the US public networks

May 22, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Hackers use Tiktok videos to distribute Widar and Crealc Malsware by Clickfix technique

May 23, 2025

Vicoviodtrap uses the lack of Cisco to create global Honeypot with 5300 compromised devices

May 23, 2025

300 servers and € 3.5 million, confiscated when Europe Strikes Ransomwark Networks worldwide

May 23, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.