Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:11)
Most environments trust far more than they should, and attackers know it. ThreatLocker solves that by enforcing default deny at the point of execution. With ThreatLocker allow listing, you stop unknown executables cold. With ring fencing, you control how trusted applications behave, and with threatlocker DAC defense against configurations, you get real assurance that your environment is free of misconfigurations and clear visibility into whether you meet compliance standards. ThreatLocker is the simplest way to enforce zero trust principles without the operational pain. It's powerful protection that gives CISOs real visibility, real control, and real peace of mind. ThreatLocker makes zero trust attainable even for small security teams. See why thousands of organizations choose ThreatLocker to minimize alert fatigue, stop ransomware at the source, and regain control over their environments. Schedule your demo@threatlocker.com N2K today. Hello everyone and welcome to the Cyberwires Research Research Saturday I'm Dave Buettner and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, solving some of the hard problems, and protecting ourselves in our rapidly evolving cyberspace. Thanks for joining us.
C (1:48)
Clickfix is a malware delivery technique. It's not sophisticated, it's very simple, and it typically involves just tricking the user to copy and pasting a malicious malicious command.
B (2:00)
That's Ben Folland, Security Operations Analyst from Huntress. The research we're discussing today is titled Click Fix Gets Creative Malware Buried in Images.
C (2:19)
I noticed there was a specific campaign, a ClickFix campaign, and we started seeing certain indicators of compromise that would indicate it's the same campaign on multiple incidents. So this happened for a few days. I was doing my analysis and I was doing the investigation and we observed that the ClickFix campaign started with a user being instructed to copy and paste a malicious command and it was encoded with a hex hex encoded IP address. We did this investigation and did some malware analysis and we realized, and this is what made the campaign interesting, is the malware leveraged technique called steganography and it hided, it hid malicious payloads, the actual final core info stealing malware payload within a benign PNG image. And only during the malware's execution chain did the image get extracted and the malware forensically pulled from the image and then ran dynamically. So the steganography in the campaign made it really interesting. This is something we don't often see and it's an interesting evasion technique. A way of hiding the malicious code within a benign image.
![Picture perfect deception. [Research Saturday] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2Fe43651aa-f303-11f0-b01a-bbff682af73e%2Fimage%2F95b72a93c2ffaf8ff900d662a9bd3735.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)