Cyber News

Rhadamanthys Infostealer Exploits ClickFix Method to Harvest Login Credentials

A sophisticated phishing campaign has been detected leveraging the domain ypp-studio[.]com to deliver the notorious Rhadamanthys infostealer, marking a new escalation in phishing and malware delivery tactics.

Using advanced evasion methods and a novel ClickFix CAPTCHA delivery mechanism, this campaign poses a significant risk to individuals and organizations worldwide.

Fileless Delivery: From Phishing Domain to Infostealer

Investigators traced suspicious PowerShell activity leading back to hxxps://ypp-studio[.]com/update.txt, a resource containing obfuscated and hex-encoded scripts. These scripts, when executed, leverage the following PowerShell enhancements:

  • Window hiding (-w hidden),
  • Execution policy bypasses (-ep bypass),
  • Profile skipping (-nop),
    enabling a stealthy, fileless attack chain. The script defines a remote URL for malware retrieval, decodes the payload, and ultimately invokes the malicious file with:
    msiexec.exe /i %AppData%\PTRFHDGS.msi.

Upon visiting a related IP (hxxp://62.60.226.74/PTRFHDGS.msi), an automatic download of rh_0.9.0.exe is triggered. This executable closely matches previously documented Rhadamanthys Stealer samples.

Recent updates reveal a shift from older delivery servers to this new infrastructure, reinforcing the ongoing development and distribution of Rhadamanthys as Malware-as-a-Service (MaaS).

Advanced Evasion and Data Exfiltration

Rhadamanthys is renowned for its anti-analysis capabilities. The malware employs multiple checks to detect sandbox environments, virtual machines, and debugging tools by cross-referencing active process lists with known analysis tools such as x64dbg.exeProcessHacker.exeWireshark.exe, and others.

It uses time-based side-channel attacks, process blacklists, and direct Winsock API calls to evade network-based detection.

Once active, the infostealer’s reach is extensive. It systematically harvests:

  • Credentials, cookies, and autofill data from web browsers,
  • Cryptocurrency wallet files,
  • Messaging app accounts (Telegram, Discord, etc.),
  • Files from FTP, VPN, and email clients,
  • Screenshots of user activity,
  • Password manager vaults (e.g., KeePass).

Network exfiltration is executed over direct TCP sockets to hardcoded command-and-control IPs (such as 193.109.85.136), further bypassing DNS monitoring.

Evolving Social Engineering: ClickFix Captcha as Attack Vector

The use of ClickFix CAPTCHA gateways in this campaign demonstrates an evolution in social engineering.

By requiring users to “verify” themselves, attackers disguise malicious downloads as legitimate interactions, thereby bypassing security controls and luring victims into executing sophisticated fileless malware.

This campaign highlights the adaptability of Rhadamanthys operators, combining advanced delivery infrastructure, anti-analysis, and social engineering.

Organizations should bolster endpoint monitoring and educate users about phishing and suspicious PowerShell activities. Sigma detection rules targeting the infostealer’s unique behaviors are recommended for early detection and rapid response.

Priya

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago