Our latest TDR report on the #IClickFix framework:
π 3,800+ WordPress sites compromised worldwide
βοΈ Multi-stage JavaScript loader
π¦ Abusing YOURLS as TDS
π±οΈ Fake Cloudflare CAPTCHA and #ClickFix lure
π¦ #NetSupport RAT payload
bsky.app/profile/seko...
29.01.2026 09:30
π 3
π 1
π¬ 1
π 0
ddeddbeae5599b0419aa25ada1b1f678f870ae9d696f32663abd6eb3de7cc2a6 > webmil.duckdns.]org/partner/corperate/
01.12.2025 15:12
π 0
π 0
π¬ 0
π 0
Outlook and Zimbra phishing pages are distributed via email using malicious SVG files that contain obfuscated JavaScript (common phishing TTP nowadays), e.g.
ec7a3247bc86636c6b08bef9a1568b63c289a2d72464c9adebcf16ccfc2ce0f3 > zimbrastorage.duckdns.]org/BJ/zimbra/
β¬οΈ
01.12.2025 15:12
π 0
π 0
π¬ 1
π 0
spaceoptimize.duckdns[.]org
spaceup.duckdns[.]org
spaceupstorage.duckdns[.]org
webmaii.duckdns[.]org
webmailstorage.duckdns[.]org
webmil.duckdns[.]org
zimbrastorage.duckdns[.]org
zirmbra.duckdns[.]org
zlmbrastorage.duckdns[.]org
spaceupzimbra.chickenkiller[.]com
β¬οΈ
01.12.2025 15:12
π 0
π 0
π¬ 1
π 0
Open directory at 104.168.81.]229/BJ/ containing phishing pages for Zimbra, Outlook, Adobe, and various Chinese services
104.168.81.]229
microsoftstorage.duckdns[.]org
outllook.duckdns[.]org
outlookspace.duckdns[.]org
patnerrshipp.duckdns[.]org
β¬οΈ
01.12.2025 15:12
π 0
π 0
π¬ 1
π 0
#TDR analysts dig into a modus operandi targeting the hospitality industry and the related cybercrime ecosystem that facilitates #phishing and #fraud campaigns.
blog.sekoia.io/phishing-cam...
06.11.2025 10:27
π 5
π 3
π¬ 1
π 0
π Our latest #TDR report delivers an in-depth analysis of Adversary-in-the-Middle (#AitM) #phishing threats - targeting Microsoft 365 and Google accounts - and their ecosystem.
This report shares actionable intelligence to help analysts detect and investigate AitM phishing.
11.06.2025 08:32
π 10
π 7
π¬ 1
π 0
Check out our new blog post by the TDR team, presenting the latest TTPs used by the #Interlock ransomware group!
It includes their use of the ClickFix tactic, PyInstaller, Node.js, Cloudflare Tunnels, and new PowerShell loader/backdoor β¬οΈ
bsky.app/profile/seko...
βοΈ @kseznec.bsky.social
16.04.2025 16:12
π 2
π 0
π¬ 1
π 0
Since the apparition of the #Interlock ransomware, the Sekoia #TDR team observed its operators evolving, improving their toolset (#LummaStealer and #BerserkStealer), and leveraging new techniques such as #ClickFix to deploy the ransomware payload.
blog.sekoia.io/interlock-ra...
16.04.2025 09:13
π 2
π 5
π¬ 0
π 1
Search - urlscan.io
urlscan.io - Website scanner for suspicious and malicious URLs
Current decoy pages used since 18 March, changing every 3/4 weeks since the beginning of 2025:
urlscan.io/search/#page...
24.03.2025 12:56
π 0
π 0
π¬ 0
π 0
Tycoon 2FA (a prominent AitM phishing kit), targeting Microsoft and Google accounts, uses a new CAPTCHA page instead of the custom Cloudflare Turnstile page
e.g.
hxxps://ymi.bvyunz.]ru/3v4jfQ-cUo/
hxxps://xau.kolivax.]ru/ckYHFJN/
hxxps://ffqt.lzirleg.]es/VajlR/
β¬οΈ
24.03.2025 12:56
π 2
π 1
π¬ 1
π 0
CTI tip: monitor transactions from the Ethereum address 0x53fd54f55C93f9BCCA471cD0CcbaBC3Acbd3E4AA to identify new PowerShell commands distributed by ClearFake - and block/detect any traffic to malicious domains!
As usual, feedback is greatly appreciated!
20.03.2025 18:50
π 2
π 1
π¬ 0
π 0
Here is our in-depth analysis of the latest #ClearFake variant using the Binance Smart Chain and two new ClickFix lures.
ClearFake is injected into thousands of compromised sites to distribute the #Emmental Loader, #Lumma, #Rhadamanthys, and #Vidar.
β¬οΈ
bsky.app/profile/seko...
20.03.2025 18:50
π 4
π 1
π¬ 1
π 0
ClearFakeβs New Widespread Variant: Increased Web3 Exploitation for Malware Delivery
ClearFake spreads malware via compromised websites, using fake CAPTCHAs, JavaScript injections, and drive-by downloads.
TDR analysts published an analysis of the new #ClearFake variant that relies on compromised websites injected with the malicious JavaScript framework, the #EtherHiding technique, and the #ClickFix social engineering tactic.
buff.ly/vbiVbsN
19.03.2025 13:28
π 5
π 3
π¬ 1
π 1
VirusTotal
VirusTotal
5. Further downloading and executing Rhadamanthys from:
bytes.microstorage.]shop/code.bin (virustotal.com/gui/file/a88...)
6. Communicating with C2 at:
91.240.118.]2:9769
Public analysis of the recent ClearFake variant: security.szustak.pl/etherhide/et...
06.03.2025 10:50
π 0
π 0
π¬ 0
π 0
VirusTotal
VirusTotal
3. Malicious PowerShell command is copied into the user's clipboard data to be executed in the Run dialog box
4. Downloading Emmenhtal from:
bytes.microstorage.]shop (1st stage)
w66.discoverconicalcrouton.]shop (2nd stage)
β¬οΈ
06.03.2025 10:50
π 0
π 0
π¬ 1
π 0
#ClearFake variant is now spreading #Rhadamanthys Stealer via #Emmenhtal Loader.
cc @plebourhis.bsky.social @sekoia.io
1. ClearFake framework is injected on compromised WordPress and relies on EtherHiding
2. The #ClickFix lure uses a fake Cloudflare Turnstile with unusual web traffic
β¬οΈ
06.03.2025 10:50
π 3
π 2
π¬ 2
π 0
This is not planned at the moment! π
24.01.2025 15:24
π 0
π 0
π¬ 1
π 0
For those who did not monitor the supply chain attack against Chrome extensions in December 2024, our article provides an overview of:
- the targeted phishing attack against extension developers
- malicious code
- the adversary's infrastructure
β¬οΈ
bsky.app/profile/seko...
22.01.2025 14:39
π 3
π 3
π¬ 0
π 0
TDR analysts analysed the supply chain attack targeting Chrome browser extensions, which potentially affected hundreds of thousands of end users in December 2024.
https://buff.ly/4auQ0HN
22.01.2025 14:30
π 8
π 4
π¬ 1
π 1
Full domain list:
gist.githubusercontent.com/qbourgue/071...
Distribution URLs:
hxxps://reddit-15.gmvr.]org/topic/inxcuh?engine=opentext+encase+forensic
hxxps://wettransfer80.tynd.]org/file/abbstd
Lumma Stealer C2:
weighcobbweo.]top
Triage analysis:
tria.ge/250120-vzdzz...
20.01.2025 18:13
π 0
π 0
π¬ 0
π 0
Around 1,000 malicious domains are hosting webpages impersonating Reddit and WeTransfer, redirecting users to download password-protected archives
These archives contain an AutoIT dropper, we internally named #SelfAU3 Dropper at @sekoia.io, which executes #Lumma Stealer
IoCs β¬οΈ
20.01.2025 18:13
π 9
π 6
π¬ 2
π 0
We confirm that the WikiKit phishing pages correspond to those of the Sneaky Log service, which we chose to name Sneaky 2FA!
16.01.2025 16:44
π 0
π 0
π¬ 0
π 0
In late December 2024, TRACLabs analysed a Sneaky 2FA phishing campaign and dubbed the kit "WikiKit".
Meanwhile, we investigated another campaign that led to the discovery of Sneaky 2FA code, as well as the Telegram bot advertising and selling it.
16.01.2025 16:44
π 0
π 0
π¬ 1
π 0
Our last article exposes the new AiTM phishing kit Sneaky 2FA, sold by the cybercrime service "Sneaky Log"!
We provide an in-depth analysis of the phishing pages, the associated service, detection opportunities and multiple IoCs.
β¬οΈ
bsky.app/profile/seko...
16.01.2025 16:44
π 6
π 1
π¬ 1
π 0
ThreatFox - Vidar
Hunt for Vidar IOCs on ThreatFox
hxxps://steamcommunity.]com/profiles/76561199816275252
Some active C2s:
wltk03.]sbs
95.217.25.]164
94.130.191.]182
quils.]live
grutt.]click
116.203.13.]109
37.27.214.]36
Find more #Vidar IoCs on ThreatFox:
threatfox.abuse.ch/browse/malwa...
08.01.2025 08:12
π 0
π 0
π¬ 0
π 0
Recent update in #Vidar C2 servers configuration:
HTTP Location header set to "hxxps://t.]me", instead of "hxxps://google.]com"
Heuristic to track C2 IPs and domains on Censys:
search.censys.io/search?resou...
Dead Drop Resolvers (DDR) of the week:
hxxps://t.]me/no111p
β¬οΈ
08.01.2025 08:12
π 3
π 0
π¬ 1
π 0
Cybercrime Exposed Podcast: Raccoon Stealer
Intel 471 empowers cybersecurity teams worldwide to be proactive with its TITAN platform and comprehensive coverage into the criminal underground.
π¦ The new episode of @intel471.bsky.social "Cybercrime Exposed" podcast produced by @jkirk.bsky.social tells the story of #Raccoon Stealer and, more broadly, reveals how the #infostealer ecosystem operates.
Featuring @crep1x.bsky.social from @sekoia.io!
intel471.com/resources/po...
04.12.2024 10:29
π 4
π 2
π¬ 0
π 0