home.social

#clipboard — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #clipboard, aggregated by home.social.

  1. ClickFix Removes Your Background but Leaves the Malware

    BackgroundFix masquerades as a free image-editing tool but functions as a ClickFix social engineering lure. The fake service prompts users to verify they are human, copying malicious commands to their clipboard that invoke finger.exe to retrieve additional payloads. This chain delivers CastleLoader, which subsequently drops NetSupport RAT and a custom .NET stealer dubbed CastleStealer. The loader uses reflective PE injection, API hashing, and ChaCha20-encrypted C2 communications. CastleStealer targets browser credentials, cryptocurrency wallet extensions, and Telegram sessions through DPAPI decryption and Restart Manager APIs. The campaign leverages BYOI tactics with embedded Python interpreters and multiple shellcode stages. A notable implementation flaw exists where launch method 4 references regsrv32.exe instead of the correct regsvr32.exe, causing silent failures.

    Pulse ID: 69f36a0940fe2fa665ebe32e
    Pulse Link: otx.alienvault.com/pulse/69f36
    Pulse Author: AlienVault
    Created: 2026-04-30 14:41:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Browser #ChaCha20 #Clipboard #CyberSecurity #ICS #InfoSec #Malware #NET #NetSupport #NetSupportRAT #OTX #OpenThreatExchange #Python #RAT #ShellCode #SocialEngineering #Telegram #bot #cryptocurrency #AlienVault

  2. ClickFix Removes Your Background but Leaves the Malware

    BackgroundFix masquerades as a free image-editing tool but functions as a ClickFix social engineering lure. The fake service prompts users to verify they are human, copying malicious commands to their clipboard that invoke finger.exe to retrieve additional payloads. This chain delivers CastleLoader, which subsequently drops NetSupport RAT and a custom .NET stealer dubbed CastleStealer. The loader uses reflective PE injection, API hashing, and ChaCha20-encrypted C2 communications. CastleStealer targets browser credentials, cryptocurrency wallet extensions, and Telegram sessions through DPAPI decryption and Restart Manager APIs. The campaign leverages BYOI tactics with embedded Python interpreters and multiple shellcode stages. A notable implementation flaw exists where launch method 4 references regsrv32.exe instead of the correct regsvr32.exe, causing silent failures.

    Pulse ID: 69f36a0940fe2fa665ebe32e
    Pulse Link: otx.alienvault.com/pulse/69f36
    Pulse Author: AlienVault
    Created: 2026-04-30 14:41:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Browser #ChaCha20 #Clipboard #CyberSecurity #ICS #InfoSec #Malware #NET #NetSupport #NetSupportRAT #OTX #OpenThreatExchange #Python #RAT #ShellCode #SocialEngineering #Telegram #bot #cryptocurrency #AlienVault

  3. ClickFix Removes Your Background but Leaves the Malware

    BackgroundFix masquerades as a free image-editing tool but functions as a ClickFix social engineering lure. The fake service prompts users to verify they are human, copying malicious commands to their clipboard that invoke finger.exe to retrieve additional payloads. This chain delivers CastleLoader, which subsequently drops NetSupport RAT and a custom .NET stealer dubbed CastleStealer. The loader uses reflective PE injection, API hashing, and ChaCha20-encrypted C2 communications. CastleStealer targets browser credentials, cryptocurrency wallet extensions, and Telegram sessions through DPAPI decryption and Restart Manager APIs. The campaign leverages BYOI tactics with embedded Python interpreters and multiple shellcode stages. A notable implementation flaw exists where launch method 4 references regsrv32.exe instead of the correct regsvr32.exe, causing silent failures.

    Pulse ID: 69f36a0940fe2fa665ebe32e
    Pulse Link: otx.alienvault.com/pulse/69f36
    Pulse Author: AlienVault
    Created: 2026-04-30 14:41:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Browser #ChaCha20 #Clipboard #CyberSecurity #ICS #InfoSec #Malware #NET #NetSupport #NetSupportRAT #OTX #OpenThreatExchange #Python #RAT #ShellCode #SocialEngineering #Telegram #bot #cryptocurrency #AlienVault

  4. ClickFix Removes Your Background but Leaves the Malware

    BackgroundFix masquerades as a free image-editing tool but functions as a ClickFix social engineering lure. The fake service prompts users to verify they are human, copying malicious commands to their clipboard that invoke finger.exe to retrieve additional payloads. This chain delivers CastleLoader, which subsequently drops NetSupport RAT and a custom .NET stealer dubbed CastleStealer. The loader uses reflective PE injection, API hashing, and ChaCha20-encrypted C2 communications. CastleStealer targets browser credentials, cryptocurrency wallet extensions, and Telegram sessions through DPAPI decryption and Restart Manager APIs. The campaign leverages BYOI tactics with embedded Python interpreters and multiple shellcode stages. A notable implementation flaw exists where launch method 4 references regsrv32.exe instead of the correct regsvr32.exe, causing silent failures.

    Pulse ID: 69f36a0940fe2fa665ebe32e
    Pulse Link: otx.alienvault.com/pulse/69f36
    Pulse Author: AlienVault
    Created: 2026-04-30 14:41:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Browser #ChaCha20 #Clipboard #CyberSecurity #ICS #InfoSec #Malware #NET #NetSupport #NetSupportRAT #OTX #OpenThreatExchange #Python #RAT #ShellCode #SocialEngineering #Telegram #bot #cryptocurrency #AlienVault

  5. Analyzing a Full ClickFix Attack Chain - Part 1

    A sophisticated ClickFix campaign was detected in mid-March 2026, beginning with a malicious webpage impersonating Booking.com's visual identity with a fake CAPTCHA. The attack leverages social engineering to trick victims into executing a PowerShell command that downloads and runs a script directly in memory. The JavaScript code automatically copies malicious commands to the clipboard and intercepts copy events. Once executed, the PowerShell dropper performs system fingerprinting, downloads a ZIP payload from a remote server, deploys it to user directories, establishes persistence through registry keys and scheduled tasks, and executes the final payload. The campaign demonstrates well-structured code with fallback mechanisms and real-time telemetry via Telegram, suggesting the use of a ready-to-use attack kit.

    Pulse ID: 69ea2d5cd8732f2d8910fceb
    Pulse Link: otx.alienvault.com/pulse/69ea2
    Pulse Author: AlienVault
    Created: 2026-04-23 14:31:56

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CAPTCHA #Clipboard #CyberSecurity #InfoSec #Java #JavaScript #OTX #OpenThreatExchange #PowerShell #RAT #RCE #SMS #SocialEngineering #Telegram #ZIP #bot #AlienVault

  6. TwizAdmin -- Multi-Stage Crypto Clipper, Infostealer & Ransomware Operation

    A sophisticated multi-stage malware operation was identified through an exposed C2 panel at 103.241.66[.]238:1337, combining cryptocurrency clipboard hijacking across eight chains, BIP-39 seed phrase theft, browser credential exfiltration, ransomware module (crpx0), and Java RAT builder managed via FastAPI-based panel with license key system. The operation targets Windows and macOS using FedEx and OnlyFans-themed social engineering lures, with complete source code exposed in open directories. The ransomware component communicates with three Russian .ru domains resolving to 31.31.198[.]206 at REG.RU hosting, operating under the identity DataBreachPlus with Telegram, qTox, and ProtonMail contacts. Ten cryptocurrency wallet addresses spanning Bitcoin, Ethereum, Tron, Dogecoin, Litecoin, Solana, Ripple, and Bitcoin Cash were extracted from configurations, indicating a Malware-as-a-Service operation with tiered licensing.

    Pulse ID: 69e8c1fb96869b14e2c565a2
    Pulse Link: otx.alienvault.com/pulse/69e8c
    Pulse Author: AlienVault
    Created: 2026-04-22 12:41:31

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BitCoin #Browser #Clipboard #CyberSecurity #InfoSec #InfoStealer #Java #Mac #MacOS #Malware #MalwareAsAService #OTX #OpenThreatExchange #RAT #RCE #RansomWare #Russia #SocialEngineering #Telegram #Windows #bot #cryptocurrency #AlienVault

  7. After some time another #crafting experiment.
    This time I decided to attempt making a #clipboard a project that is pretty easy and quick to do. The only problem I faced was the "rivets" (i don't know what is their real name), I didn't had the proper tool to secure them, so they are a little bit deformed. Follow me on #kofi (all posts are free): ko-fi.com/post/A-new-experimen #art #artandcraft
    #bookbinding #craft #crafts #handmade #diy #cardboard #paper #hardcover #papercraft #handcraft

  8. After fiddling around with a number of different #clipboard managers, I finally came upon #Copyous this morning. The other utilities I tried either had issues with #Wayland / #Gnome or just felt too clunky.
    Copyous on the other hand, integrates pretty seamlessly into the system and feels like a very natural extension of the DE so far.

    It's based on #Pano and is available in the standard #GnomeExtension library.

    Anyone else using this?
    https://github.com/boerdereinar/copyous