• bitcoinBitcoin (BTC) $ 68,476.00
  • ethereumEthereum (ETH) $ 1,985.95
  • tetherTether (USDT) $ 0.999603
  • xrpXRP (XRP) $ 1.48
  • bnbBNB (BNB) $ 626.80
  • usd-coinUSDC (USDC) $ 0.999922
  • solanaSolana (SOL) $ 86.27
  • tronTRON (TRX) $ 0.283929
  • staked-etherLido Staked Ether (STETH) $ 2,265.05
  • dogecoinDogecoin (DOGE) $ 0.100385
  • figure-helocFigure Heloc (FIGR_HELOC) $ 1.02
  • bitcoin-cashBitcoin Cash (BCH) $ 566.23
  • whitebitWhiteBIT Coin (WBT) $ 51.72
  • cardanoCardano (ADA) $ 0.286559
  • usdsUSDS (USDS) $ 0.999243
  • wrapped-stethWrapped stETH (WSTETH) $ 2,779.67
  • leo-tokenLEO Token (LEO) $ 8.57
  • hyperliquidHyperliquid (HYPE) $ 30.88
  • wrapped-bitcoinWrapped Bitcoin (WBTC) $ 76,243.00
  • chainlinkChainlink (LINK) $ 8.93
  • binance-bridged-usdt-bnb-smart-chainBinance Bridged USDT (BNB Smart Chain) (BSC-USD) $ 0.998762
  • ethena-usdeEthena USDe (USDE) $ 0.999058
  • wrapped-beacon-ethWrapped Beacon ETH (WBETH) $ 2,466.93
  • moneroMonero (XMR) $ 340.77
  • canton-networkCanton (CC) $ 0.161761
  • stellarStellar (XLM) $ 0.167909
  • wrapped-eethWrapped eETH (WEETH) $ 2,465.31
  • usd1-wlfiUSD1 (USD1) $ 0.998678
  • zcashZcash (ZEC) $ 291.03
  • rainRain (RAIN) $ 0.009637
  • susdssUSDS (SUSDS) $ 1.08
  • hedera-hashgraphHedera (HBAR) $ 0.101058
  • litecoinLitecoin (LTC) $ 55.12
  • coinbase-wrapped-btcCoinbase Wrapped BTC (CBBTC) $ 76,366.00
  • daiDai (DAI) $ 0.999984
  • paypal-usdPayPal USD (PYUSD) $ 0.999811
  • avalanche-2Avalanche (AVAX) $ 9.21
  • wethWETH (WETH) $ 2,268.37
  • shiba-inuShiba Inu (SHIB) $ 0.000007
  • suiSui (SUI) $ 0.982968
  • the-open-networkToncoin (TON) $ 1.44
  • usdt0USDT0 (USDT0) $ 0.998824
  • crypto-com-chainCronos (CRO) $ 0.080262
  • world-liberty-financialWorld Liberty Financial (WLFI) $ 0.100383
  • memecoreMemeCore (M) $ 1.52
  • tether-goldTether Gold (XAUT) $ 4,931.07
  • polkadotPolkadot (DOT) $ 1.37
  • pax-goldPAX Gold (PAXG) $ 4,959.57
  • uniswapUniswap (UNI) $ 3.59
  • ethena-staked-usdeEthena Staked USDe (SUSDE) $ 1.22
  • mantleMantle (MNT) $ 0.643503
  • aaveAave (AAVE) $ 126.46
  • pepePepe (PEPE) $ 0.000004
  • bittensorBittensor (TAO) $ 193.08
  • blackrock-usd-institutional-digital-liquidity-fundBlackRock USD Institutional Digital Liquidity Fund (BUIDL) $ 1.00
  • aster-2Aster (ASTER) $ 0.732412
  • falcon-financeFalcon USD (USDF) $ 0.997139
  • okbOKB (OKB) $ 80.02
  • bitget-tokenBitget Token (BGB) $ 2.38
  • hashnote-usycCircle USYC (USYC) $ 1.12
  • global-dollarGlobal Dollar (USDG) $ 0.999938
  • syrupusdcsyrupUSDC (SYRUPUSDC) $ 1.15
  • pi-networkPi Network (PI) $ 0.176328
  • htx-daoHTX DAO (HTX) $ 0.000002
  • skySky (SKY) $ 0.066869
  • ripple-usdRipple USD (RLUSD) $ 0.999525
  • ethereum-classicEthereum Classic (ETC) $ 8.80
  • nearNEAR Protocol (NEAR) $ 1.06
  • ondo-financeOndo (ONDO) $ 0.276811
  • internet-computerInternet Computer (ICP) $ 2.41
  • bfusdBFUSD (BFUSD) $ 0.999023
  • pump-funPump.fun (PUMP) $ 0.002226
  • worldcoin-wldWorldcoin (WLD) $ 0.399918
  • polygon-ecosystem-tokenPOL (ex-MATIC) (POL) $ 0.107081
  • gatechain-tokenGate (GT) $ 7.24
  • cosmosCosmos Hub (ATOM) $ 2.28
  • kucoin-sharesKuCoin (KCS) $ 8.46
  • jupiter-perpetuals-liquidity-provider-tokenJupiter Perpetuals Liquidity Provider Token (JLP) $ 4.00
  • ethenaEthena (ENA) $ 0.122676
  • superstate-short-duration-us-government-securities-fund-ustbSuperstate Short Duration U.S. Government Securities Fund (USTB) (USTB) $ 10.99
  • hash-2Provenance Blockchain (HASH) $ 0.017305
  • midnight-3Midnight (NIGHT) $ 0.056493
  • jito-staked-solJito Staked SOL (JITOSOL) $ 124.46
  • nexoNEXO (NEXO) $ 0.890793
  • kaspaKaspa (KAS) $ 0.032191
  • kelp-dao-restaked-ethKelp DAO Restaked ETH (RSETH) $ 2,404.69
  • usdtbUSDtb (USDTB) $ 0.999755
  • algorandAlgorand (ALGO) $ 0.093724
  • binance-peg-wethBinance-Peg WETH (WETH) $ 2,262.26
  • flare-networksFlare (FLR) $ 0.009728
  • rocket-pool-ethRocket Pool ETH (RETH) $ 2,631.35
  • official-trumpOfficial Trump (TRUMP) $ 3.34
  • eutblSpiko EU T-Bills Money Market Fund (EUTBL) $ 1.24
  • binance-bridged-usdc-bnb-smart-chainBinance Bridged USDC (BNB Smart Chain) (USDC) $ 0.999945
  • morphoMorpho (MORPHO) $ 1.39
  • render-tokenRender (RENDER) $ 1.46
  • wbnbWrapped BNB (WBNB) $ 759.61
  • xdce-crowd-saleXDC Network (XDC) $ 0.036828
  • ignition-fbtcFunction FBTC (FBTC) $ 76,389.00
  • filecoinFilecoin (FIL) $ 0.969537
  • aptosAptos (APT) $ 0.929090
  • janus-henderson-anemoy-aaa-clo-fundJanus Henderson Anemoy AAA CLO Fund (JAAA) $ 1.03
  • ousgOUSG (OUSG) $ 114.29
  • usddUSDD (USDD) $ 0.999523
  • syrupusdtsyrupUSDT (SYRUPUSDT) $ 1.11
  • vechainVeChain (VET) $ 0.008227
  • ondo-us-dollar-yieldOndo US Dollar Yield (USDY) $ 1.11
  • arbitrumArbitrum (ARB) $ 0.114768
  • binance-staked-solBinance Staked SOL (BNSOL) $ 108.24
  • pippinpippin (PIPPIN) $ 0.657872
  • beldexBeldex (BDX) $ 0.080166
  • bonkBonk (BONK) $ 0.000007
  • usual-usdUsual USD (USD0) $ 0.994366
  • stable-2​​Stable (STABLE) $ 0.031835
  • janus-henderson-anemoy-treasury-fundJanus Henderson Anemoy Treasury Fund (JTRSY) $ 1.10
  • bridged-usdc-polygon-pos-bridgePolygon Bridged USDC (Polygon PoS) (USDC.E) $ 0.999720
  • usdaiUSDai (USDAI) $ 0.999622
  • solv-btcSolv Protocol BTC (SOLVBTC) $ 76,461.00
  • jupiter-exchange-solanaJupiter (JUP) $ 0.168462
  • lombard-staked-btcLombard Staked BTC (LBTC) $ 76,491.00
  • ghoGHO (GHO) $ 1.00
  • sei-networkSei (SEI) $ 0.075527
  • a7a5A7A5 (A7A5) $ 0.012918
  • clbtcclBTC (CLBTC) $ 76,920.00
  • true-usdTrueUSD (TUSD) $ 0.998058
  • dashDash (DASH) $ 38.24
  • fasttokenFasttoken (FTN) $ 1.09
  • blockstackStacks (STX) $ 0.263515
  • euro-coinEURC (EURC) $ 1.18
  • pudgy-penguinsPudgy Penguins (PENGU) $ 0.007238
  • stakewise-v3-osethStakeWise Staked ETH (OSETH) $ 2,419.84
  • pancakeswap-tokenPancakeSwap (CAKE) $ 1.32
  • virtual-protocolVirtuals Protocol (VIRTUAL) $ 0.660669
  • kinetic-staked-hypeKinetiq Staked HYPE (KHYPE) $ 33.97
  • tbtctBTC (TBTC) $ 70,942.00
  • tezosTezos (XTZ) $ 0.395651
  • chilizChiliz (CHZ) $ 0.041103
  • wrappedm-by-m0WrappedM by M0 (WM) $ 1.00
  • lighterLighter (LIT) $ 1.67
  • decredDecred (DCR) $ 23.92
  • story-2Story (IP) $ 1.15
  • optimismOptimism (OP) $ 0.189068
  • first-digital-usdFirst Digital USD (FDUSD) $ 0.999000
  • fetch-aiArtificial Superintelligence Alliance (FET) $ 0.172637
  • kinesis-goldKinesis Gold (KAU) $ 160.50
  • mantle-staked-etherMantle Staked Ether (METH) $ 2,455.82
  • curve-dao-tokenCurve DAO (CRV) $ 0.253436
  • justJUST (JST) $ 0.042466
  • polygon-pos-bridged-dai-polygon-posPolygon PoS Bridged DAI (Polygon POS) (DAI) $ 0.999983
  • kite-2Kite (KITE) $ 0.205515
  • resolv-wstusrResolv wstUSR (WSTUSR) $ 1.13
  • c8ntinuumc8ntinuum (CTM) $ 0.084635
  • cocaCOCA (COCA) $ 1.30
  • humanityHumanity (H) $ 0.196514
  • ether-fiEther.fi (ETHFI) $ 0.479068
  • myx-financeMYX Finance (MYX) $ 1.81
  • liquid-staked-ethereumLiquid Staked ETH (LSETH) $ 2,406.26
  • bitcoin-svBitcoin SV (BSV) $ 17.04
  • arbitrum-bridged-wbtc-arbitrum-oneArbitrum Bridged WBTC (Arbitrum One) (WBTC) $ 76,200.00
  • layerzeroLayerZero (ZRO) $ 1.68
  • gnosisGnosis (GNO) $ 128.87
  • bittorrentBitTorrent (BTT) $ 0.00000034
  • kaiaKaia (KAIA) $ 0.057676
  • wrapped-flareWrapped Flare (WFLR) $ 0.009961
  • apenftAINFT (NFT) $ 0.00000034
  • sun-tokenSun Token (SUN) $ 0.017288
  • l2-standard-bridged-weth-baseL2 Standard Bridged WETH (Base) (WETH) $ 2,266.86
  • pyth-networkPyth Network (PYTH) $ 0.056466
  • steakhouse-usdc-morpho-vaultSteakhouse USDC Morpho Vault (STEAKUSDC) $ 1.12
  • usxUSX (USX) $ 0.999541
  • injective-protocolInjective (INJ) $ 3.13
  • flokiFLOKI (FLOKI) $ 0.000032
  • spx6900SPX6900 (SPX) $ 0.327221
  • iotaIOTA (IOTA) $ 0.071058
  • binance-peg-xrpBinance-Peg XRP (XRP) $ 1.59
  • celestiaCelestia (TIA) $ 0.344503
  • ether-fi-liquid-ethEther.Fi Liquid ETH (LIQUIDETH) $ 2,443.47
  • the-graphThe Graph (GRT) $ 0.027990
  • renzo-restaked-ethRenzo Restaked ETH (EZETH) $ 2,421.84
  • hastra-primePRIME (PRIME) $ 1.02
  • jasmycoinJasmyCoin (JASMY) $ 0.005983
  • sbtc-2sBTC (SBTC) $ 77,039.00
  • aerodrome-financeAerodrome Finance (AERO) $ 0.321186
  • syrupMaple Finance (SYRUP) $ 0.251410
  • adi-tokenADI (ADI) $ 2.99
  • jupiter-staked-solJupiter Staked SOL (JUPSOL) $ 115.56
  • lido-daoLido DAO (LDO) $ 0.343024
  • savings-usddSavings USDD (SUSDD) $ 1.03
  • crvusdcrvUSD (CRVUSD) $ 0.998664
  • conflux-tokenConflux (CFX) $ 0.054759
  • fraxLegacy Frax Dollar (FRAX) $ 0.991779
  • msolMarinade Staked SOL (MSOL) $ 133.18
  • olympusOlympus (OHM) $ 17.24
  • arbitrum-bridged-weth-arbitrum-oneArbitrum Bridged WETH (Arbitrum One) (WETH) $ 2,265.06
  • doublezeroDoubleZero (2Z) $ 0.076664
  • heliumHelium (HNT) $ 1.43
  • telcoinTelcoin (TEL) $ 0.002793
  • starknetStarknet (STRK) $ 0.048651
  • staked-aaveStaked Aave (STKAAVE) $ 126.65
  • ethereum-name-serviceEthereum Name Service (ENS) $ 6.83

Hackers target crypto wallets, browser data in fake reCAPTCHA pop-up campaign

0 57

Hackers target crypto wallets, browser data in fake reCAPTCHA pop-up campaign

Cybersecurity group eSentire has uncovered the use of fake CAPTCHA-style pop-ups to trick victims into deploying credential-harvesting malware, Amatera Stealer, and NETSupport RAT by abusing a method known as ClickFix.

eSentire’s Threat Response Unit (TRU) has been tracking an escalation in campaigns abusing ClickFix to gain initial access to targeted systems in November. According to the TRU, threat actors use the method to socially engineer victims into running malicious commands manually through the Windows Run prompt.

Once executed, those commands launch an infection chain that ends with the deployment of Amatera Stealer and NetSupport RAT, both legitimate remote monitoring tools that have been repurposed by cybercriminals for unauthorized remote access.

ClickFix campaign uses reCAPTCHA to sneak malware in

Per eSentire’s research published last Thursday, hackers are luring victims using fake websites and pop-ups that look like “security checks,” including fraudulent reCAPTCHA verification boxes and counterfeit Cloudflare Turnstile pages.

The deceptive interfaces prompt users to “fix” a supposed issue, with the instructions causing them to execute harmful commands without seeing the risks. Once the initial command is run, Amatera Stealer is delivered first, followed by the installation of NetSupport Manager, which allows hackers to monitor and control the compromised machine as though they were physically present.

Amatera Stealer is not an entirely new threat but the latest evolution of ACR Stealer, also known as AcridRain. The earlier version first appeared as a malware-as-a-service product on hacker forums in 2024, which several users deployed through subscription packages.

Sales of ACR were paused in mid-2024 when its developer, known online as SheldIO, sold the malware’s source code. Despite the sale announcement, the group said it was “not the end” of its development. Researchers now believe Amatera is the direct successor to ACR, rebuilt with more capabilities and new evasion techniques.

Amatera, spotted by security auditing firm Proofpoint in June, is available on a subscription basis from $199 per month to $1,499 annually.

“Amatera provides threat actors with extensive data exfiltration capabilities targeting crypto-wallets, browsers, messaging applications, FTP clients, and email services. It employs advanced evasion strategies like WoW64 SysCalls to circumvent user-mode hooking mechanisms used by sandboxes, Anti-Virus solutions, and EDR products,” eSentire said.

The malware is written in C++ and is capable of harvesting saved passwords, card details, browsing histories, and files from browsers like Chrome, Brave, Edge, Opera, Firefox, and specialized platforms such as Tor Browser and Thunderbird.

Multi-stage Windows PowerShell loaders hiding malware

According to eSentire’s threat analysis, the Amatera’s infection process is built on several layers of obfuscated PowerShell commands.

TRU researchers saw one phase decrypting subsequent payloads using an XOR process on the string “AMSI_RESULT_NOT_DETECTED,” a term associated with Microsoft’s Anti-Malware Scan Interface. The loader’s developer could have selected the phrase intentionally to confuse researchers conducting dynamic analysis.

While Amatera is the most common payload delivered in these campaigns, eSentire also documented cases where the same loader was used to deploy other infostealers, including Lumma and Vidar. Some samples lacked configuration parameters needed to run multi-stage loaders, in which hackers chose to deploy NetSupport Manager directly instead.

eSentire and other security firms have documented email campaigns distributing Visual Basic Script files disguised as invoices. When opened, the files executed batch scripts that initiated PowerShell loaders delivering XWorm.

Other campaigns involved compromised websites that redirected visitors to fake Cloudflare verification pages, which mimic ClickFix prompts. This activity has been tied to an operation known by names including SmartApeSG, HANEYMANEY, and ZPHP, all coming with NetSupport RAT as their final payload.

Hackers had built fraudulent Booking.com websites that hosted counterfeit CAPTCHA checks, instructing users to open the Windows Run dialog and execute a command, and directly installing a credential-stealing script onto infected systems.

Some of the phishing campaigns connected to these malware deliveries are using a new phishing kit known as Cephas. Cephas, according to cybersecurity solutions firm Barracuda, uses an advanced obfuscation method that inserts invisible characters into the source code of phishing pages, difficult for automated scanners to detect.

“The kit obscures its code by creating random invisible characters within the source code that help it evade anti-phishing scanners and obstruct signature-based YARA rules from matching the exact phishing methods,” Barracuda wrote in its analysis last week.

Source

Leave A Reply

Your email address will not be published.