Connect with us

Security

ClickFix: Unleashing Fake Browser Glitches with New ErrTraffic Service

Published

on

A groundbreaking cybercrime tool known as ErrTraffic has emerged, enabling threat actors to carry out ClickFix attacks automatically by creating deceptive ‘fake glitches’ on compromised websites. These glitches are designed to entice users into downloading malicious payloads or following harmful instructions.

ErrTraffic boasts exceptional conversion rates of up to 60% and possesses the capability to identify the target system to deliver compatible payloads effectively.

ClickFix, a form of social engineering technique, involves deceiving targets into executing hazardous commands on their systems under plausible pretenses such as resolving technical issues or verifying their identities.

Wiz

ClickFix has gained significant traction since 2024, particularly in the current year, as cybercriminals and state-sponsored actors alike have embraced its efficacy in circumventing standard security measures.

Automating ClickFix

A fresh cybercrime platform named ErrTraffic was recently introduced on Russian-speaking hacking forums by an individual using the pseudonym LenAI.

Functioning as a self-hosted traffic distribution system (TDS), ErrTraffic deploys ClickFix lures and is available to customers for a one-time fee of $800.

The service promoted on hacker forums
Service promoted on hacker forums
Source: Hudson Rock

Researchers at Hudson Rock, who conducted an analysis of the platform, revealed that it offers an intuitive panel with diverse configuration options and access to real-time campaign data.

For an attack to be successful, the assailant must already control a website that receives victim traffic or has inserted malicious code into a legitimate compromised website and then integrated ErrTraffic via an HTML line.

The main panel
The main panel
Source: Hudson Rock

Regular visitors whose characteristics do not match the targeting criteria will experience the website’s normal behavior. However, when geolocation and OS fingerprinting conditions are met, the page’s Document Object Model (DOM) is altered to exhibit a visual glitch.

See also  Enhanced Security: 1Password's Latest Phishing Prevention Tool

These visual anomalies may include distorted or unreadable text, substitution of fonts with symbols, simulated Chrome updates, or fake system font errors.

These alterations create the illusion of a malfunctioning page, setting the stage for providing the victim with a ‘solution’ in the form of installing a browser update, downloading a system font, or executing commands in the command prompt.

Glitch
Visual glitch generated by ErrTraffic
Source: Hudson Rock

If the victim complies with the instructions, a PowerShell command is copied to the clipboard via JavaScript code. Executing this command triggers the download of a malicious payload.

ClickFix delivery mechanism in ErrTraffic
ClickFix delivery mechanism in ErrTraffic
source: Hudson Rock

Hudson Rock explicitly mentions that the payloads predominantly consist of Lumma and Vidar info-stealers on Windows, Cerberus trojans on Android, AMOS (Atomic Stealer) on macOS, and unspecified Linux backdoors.

Defining the payloads for each OS
Defining the payloads for each OS
Source: Hudson Rock

ErrTraffic clients have the flexibility to specify the payload for each targeted architecture and select the countries eligible for infection. Notably, there is a hardcoded exclusion for CIS (Commonwealth of Independent States) countries, hinting at the possible origin of the ErrTraffic developer.

Hudson Rock, a vigilant observer of the entire credential-theft process, notes that the harvested data is typically either sold on darknet markets or utilized to compromise additional websites and reintroduce the ErrTraffic script.

Trending