DarkSecTown
DarkSecTown @DarkSecTown ·
low detection games. py bcb29a2360358f3facb63b498d566c8b2e789927 #ModeloRAT C2 hardcoded "138.68.15.116", "67.217.228.8", "45.59.114.38"
1
11
Cybersecurity News Everyday
Cybersecurity News Everyday @TweetThreatNews ·
KongTuke exploits compromised WordPress sites with fake CAPTCHA lures to deploy Python-based modeloRAT, enabling reconnaissance, remote commands, and persistent access using PowerShell and Telegram. #KongTuke #modeloRAT #WordPressAbuse ift.tt/acWbkL7
Through the Lens of MDR: Analysis of KongTuke’s ClickFix Abuse of Compromised WordPress Sites

TrendAI Vision One™ MDR observed an active KongTuke campaign using compromised WordPress sites and fake CAPTCHA/CrashFix lures to deliver the Python-based modeloRAT, which performs reconnaissance,...

From hendryadrian.com
95
Meridian Group
Meridian Group @MeridianEU ·
#clickfix campaign shifts to DNS-based payload delivery, instructing victims to run nslookup against attacker-controlled servers. DNS responses embed PowerShell to fetch ZIP payloads, leading to #ModeloRAT deployment and persistent remote access.
44
Cybersecurity News Everyday
Cybersecurity News Everyday @TweetThreatNews ·
Microsoft reveals a ClickFix attack manipulating users to run nslookup via Run dialog and cmd.exe for DNS-based malware staging, deploying payloads like ModeloRAT, CastleLoader, and Lumma Stealer. #ClickFixAttack #DNSStaging #ModeloRAT ift.tt/tmRr6ap
Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging

Microsoft disclosed a new ClickFix variant that tricks users into running nslookup via the Windows Run dialog and cmd.exe to perform DNS-based staging and fetch a second-stage payload. The chain...

From hendryadrian.com
177