ZeroDayFacts
ZeroDayFacts @ZeroDayFacts ·
#CrashFix: New ClickFix variant weaponizes malicious browser extension Threat actors pushed a fake ad blocker named NexShield to Chrome/Edge (now removed) that triggers a DoS by saturating chrome.runtime ports, exhausting memory & CPU to crash the browser. On restart, it displays a fases classic #ClickFix social engineering to copy obfuscated PowerShell to the clipboard and coerce users into executing it, delivering a Python-based #ModeloRAT payload on domain-joined hosts. Indicators include infinite extension event loops, fake security prompts, and clipboard-injected commands targeting #cmd.exe/#PowerShell. Defensive focus: extension vetting, behavioral browser monitoring, and blocking clipboard-injection lures. @farhanmirza @azam_mughal @sidra_fatima @sajawalkhan @meharshaban @cybersecure_pk @OsamaMahmood007
36
Cyber Media
Cyber Media @infosecmedia_ ·
Специалисты по кибербезопасности обнаружили новую кампанию распространения опасного расширения для браузеров под названием #CrashFix. Оно маскировалось под обновления и дополнения к широко используемым приложениям: securitymedia.org/news/vredonosn… #Software #infosecurity #CyberMedia #ИБ
24