ThreatCat.ch's Avatar

ThreatCat.ch

@threatcat-ch

ThreatCat.ch has been founded in the autumn 2022 and consists of a bunch of experienced Cyber Threat Analysts and Incident Responders who have been working together for many years.

69
Followers
3
Following
58
Posts
31.10.2023
Joined
Posts Following

Latest posts by ThreatCat.ch @threatcat-ch

Preview
ClearFake’s New Widespread Variant: Increased Web3 Exploitation for Malware Delivery ClearFake spreads malware via compromised websites, using fake CAPTCHAs, JavaScript injections, and drive-by downloads.

@sekoia.io published a nice blog post about BSC blog.sekoia.io/clearfakes-n...
@threatcat-ch.bsky.social is tracking BSC as well, and we share our gained information on Threatfox/Bazaar @abuse_ch@ioc.exchange
Most of the delivered payloads led to Rhadamantys instead of Lumma in the last few days.

19.03.2025 12:21 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

This #Magecart smart contract got updated recently and is now pointing to keritysuc[.]xyz

16.03.2025 15:11 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Decoding the Caesar Cipher Skimmer Discover the latest credit card skimming threat, the "Caesar Cipher Skimmer," affecting multiple CMS platforms like WordPress and Magento. Learn how it works and get essential tips to protect your eco...

Decoding gives us another WebSocket based communication channel: wss://cdn[.]iconstaff[.]top/common?source=

Domain iconstaff[.]top was already reported as being Magecart related in June 2024: blog.sucuri.net/2024/06/caes...

28.02.2025 16:21 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Let’s take transaction 0x863f7[…] at Sep-02-2024 02:34:55 PM UTC – we get the following decoded JS:
testnet.bscscan.com/tx/0x863f748...

28.02.2025 16:21 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

Another confirmation of the malicious, Magecart related activity, can be found by analyzing other activities from the main BSC testnet contract 0x5178a932d5b312801e02c43fd50399a88028b9d0
testnet.bscscan.com/address/0x51...

28.02.2025 16:21 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

This assumption is reinforced when we get a further obfuscated payload from suckerity[.]xyz when visiting the checkout page & subsequently noticing a client to server data exfiltration after having entered credit card details (small extract of the ~200KB deobfuscated code)

28.02.2025 16:21 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

The contract’s content is clearly malicious and connects over WebSocket to suckerity[.]xyz (behind Cloudflare), not related to #ClearFake, but reminds us #Magecart related injections:

28.02.2025 16:21 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

While investigating an infected website, we noticed call to BSC testnet contract 0x0967296defa0fd586c9ede5730380e2b059fab95 : testnet.bscscan.com/address/0x09...

28.02.2025 16:21 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

#etherhiding (hiding malicious code in blockchain based smart contracts) is not only by #ClearFake related actors – but now also for #Magecart πŸ‘‡

28.02.2025 16:21 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 1


Screenshot of the "reports" section of RΓΆsti. The page displays multiple reports in a grid format, each with a card-like design. Each card includes information such as the report title, author, publication date, associated threat indicators (IOCs and YARA rules), and source organization.

Screenshot of the "reports" section of RΓΆsti. The page displays multiple reports in a grid format, each with a card-like design. Each card includes information such as the report title, author, publication date, associated threat indicators (IOCs and YARA rules), and source organization.

A screenshot of the home page of RΓΆsti, a web application providing Repackaged Open Source Threat Intelligence. The logo "RΓ–STI" is prominently displayed in blue. Below the logo, the description states that the platform gathers Indicators of Compromise (IOCs) from public reports, available in formats such as MISP, STIX, and ECS. There are two buttons: "Feeds" and "Reports." At the bottom, statistics are shown: 217,399 IOCs and 440 YARA rules extracted from 2,288 reports of 183 sources. A footer highlights "New parsers" added on January 28, 2025, listing CERT-FR and Netlab360 as new sources. A link to view the full changelog is in the bottom-right corner.

A screenshot of the home page of RΓΆsti, a web application providing Repackaged Open Source Threat Intelligence. The logo "RΓ–STI" is prominently displayed in blue. Below the logo, the description states that the platform gathers Indicators of Compromise (IOCs) from public reports, available in formats such as MISP, STIX, and ECS. There are two buttons: "Feeds" and "Reports." At the bottom, statistics are shown: 217,399 IOCs and 440 YARA rules extracted from 2,288 reports of 183 sources. A footer highlights "New parsers" added on January 28, 2025, listing CERT-FR and Netlab360 as new sources. A link to view the full changelog is in the bottom-right corner.

Screenshot of the "reports" section of RΓΆsti in dark mode. The page displays multiple reports in a grid format, each with a card-like design. Each card includes information such as the report title, author, publication date, associated threat indicators (IOCs and YARA rules), and source organization.

Screenshot of the "reports" section of RΓΆsti in dark mode. The page displays multiple reports in a grid format, each with a card-like design. Each card includes information such as the report title, author, publication date, associated threat indicators (IOCs and YARA rules), and source organization.

Today, I'm releasing the first version of a small web πŸš€: rosti.bin.re

It provides IOCs and YARA rules collected semi-automatically from public blog posts and reports of almost 200 cybersecurity sites.

I hope it proves useful to some of you ... πŸ™βœ¨ #CyberSecurity #ThreatIntel

30.01.2025 14:16 πŸ‘ 4 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Investigating a ClearFake/ClickFix + Etherhide campaign We have identified and tracked a new campaign utilizing ClearFake and EtherHiding technique. This infects legitimate websites resulting in information stealer.

Nice writeup of Atea's findings regarding this: www.atea.no/siste-nytt/i...

11.01.2025 15:26 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

By the way, Google based malvertisement is still going strong – also delivering #Lumma / #LummaStealer currently from hXXps://sites.google[.]com/view/gglchor then chrome.downloading[.]icu

07.01.2025 06:33 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

The command it copies in the clipboard has the following string structure:
mshta [URL] # Decoy comment to look genuine to the user and hide the previous commands in the Run prompt

This command starts a long chain of Powershell commands leading finally to #LummaStealer

06.01.2025 20:51 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

The infection hides as a base64 encoded & obfuscated Javascript directly on the home page. It gets the overlay from a smart contract and injects it into the HTML.

06.01.2025 20:51 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

#ClearFake / #ClickFix is back infecting directly legit but vulnerable websites, delivering in the end #Lumma / #LummaStealer

06.01.2025 20:51 πŸ‘ 2 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

#Lumma #Stealer #Malware spreading via malvertissment impersonating Google Chrome - check all connections to 46.202.155[.]128 (chrome.downloading.com[.]de & filenjjutre[.]online)

18.12.2024 23:29 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

New #SocGholish domain and injections - directly as SCRIPT but without async attribute + as base64 encoded URL:

30.10.2024 10:06 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
GitHub - AlexanderRPatton/cdn Contribute to AlexanderRPatton/cdn development by creating an account on GitHub.

Another related github repo: github.com/AlexanderRPa... involving domain streammain[.]top hosted on 89.169.13[.]147 . All identified github repos were reported.

30.09.2024 15:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
ThreatFox - Tag Boolka Hunt for IOCs tagged with tag 'Boolka'

In other news, we contributed to Threatfox a few #Boolka domains and IPs, including new IOCs involving softbyms[.]com
threatfox.abuse.ch/browse/tag/B...

30.09.2024 14:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Investigating further, we find yet another github repository gavnoman/gootraf which is gone, but seems to have redirected users toward awardbonus[.]shop at 147.45.197[.]80

30.09.2024 14:29 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
GitHub - lolngnos/loles Contribute to lolngnos/loles development by creating an account on GitHub.

This domain points toward yet another github account started on July 2nd, 2024 -
github.com/lolngnos/loles . Both domains currently resolve to 77.221.155[.]81 (alias painful-underwear.aeza[.]network (!) hosted at AEZA).

30.09.2024 14:29 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

A closer look into bitbucket.org/goo2/adss/sr... reveals domain support-wp[.]shop in the commit log

30.09.2024 14:29 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

3. In Javascript files, with a reference to a github repository with a very similar code

30.09.2024 14:29 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

2. In JavaScript files, with a reference to a bitbucket repository

30.09.2024 14:29 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

1. Directly into the page’s HTML at the top

30.09.2024 14:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

While investigating some odd web redirects, we stumbled upon awards2tools[.]shop, which seems to systematically redirect visitors to trk.adtrk21[.]com, then into Vextrio related domains. The injection of the initial hop on awards2tools[.]shop varies – here a few examples:

30.09.2024 14:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
VirusTotal VirusTotal

The payload is very likely AsyncRAT connecting to 185.91.69[.]119:56001
www.virustotal.com/gui/file/5d5...

26.09.2024 05:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

You might have noticed in the previous screenshot that in parallel, the page downloaded some .zip file. This file comes from Dropbox and will be decompressed and executed by the command pasted by the victim:

26.09.2024 05:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

When visiting the link, the victim first has to complete a captcha before getting to the payload delivery page where the victim is asked to execute the 2 (in-) famous commands:

26.09.2024 05:38 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

New Swiss centered malware campaign in German using some #ClearFake / #ClickFix tricks impersonating Ricardo, one of the biggest Swiss online second-hand marketplace:

26.09.2024 05:38 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0