Lazarus APT Hackers Using ClickFix Technique to Steal Sensitive Intelligence Data

0
5

Cybersecurity: Advanced Persistent Threat Analysis

The Lazarus APT group has employed the ClickFix social engineering technique to enhance its malware distribution methodology. This approach is used to exfiltrate sensitive intelligence data from targeted organizations. The group, identified as APT-Q-1 by security researchers, integrates deceptive user interface manipulation with traditional espionage tactics.

ClickFix Technique Overview

The ClickFix technique involves presenting victims with fake technical issues, guiding them through “fixes” that actually execute malicious code. This method has been integrated into existing fake recruitment campaigns, creating a complex attack vector that combines job opportunity lures with technical deception.

Attack Vector

Security analysts identified the campaign through a malicious batch script that downloads disguised NVIDIA software, deploying the group’s BeaverTail information stealer. The attack initiates when victims visit fraudulent interview websites, which prompt them to resolve fake camera configuration issues.

A PowerShell command downloads and extracts a malicious ZIP archive, initiating the infection. The group targets both Windows and macOS platforms, with tailored payloads for different architectures.

Malware Deployment and Persistence Mechanisms

The core malware package, distributed as “nvidiaRelease[.]zip” (MD5: f9e18687a38e968811b93351e9fca089), is designed for cross-platform compatibility and persistent access.

The initial script executes a sequence to download and expand the archive, deploying a script that performs system reconnaissance. On Windows 11 systems, an additional backdoor is executed, enabling command execution and file manipulation. This component communicates with command-and-control servers, allowing remote operations.

Core Malware Components

Component MD5 Hash Function
ClickFix-1[.]bat a4e58b91531d199f268c5ea02c7bf456 Initial payload downloader
nvidiaRelease[.]zip f9e18687a38e968811b93351e9fca089 Malicious archive package
run[.]vbs 3ef7717c8bcb26396fc50ed92e812d13 System reconnaissance script
main.[]js (BeaverTail) b52e105bd040bda6639e958f7d9e3090 Cross-platform information stealer
drvUpdate[.]exe 6175efd148a89ca61b6835c77acc7a8d Windows 11 backdoor

The malware achieves persistence through registry modification, ensuring execution across system reboots. The BeaverTail component communicates with a secondary command-and-control server, supporting redundant capabilities for sustained access.

Comments are closed.