Traps Beneath Fault Repair: Analysis of Recent Attacks Using ClickFix Technique
NetmanageIT OpenCTI - opencti.netmanageit.com

SUMMARY :
Lazarus, an APT group with suspected East Asian origins, has recently employed the ClickFix social engineering technique in their phishing attacks. The group, known for targeting financial institutions and cryptocurrency exchanges, now uses fake job opportunities to lure victims to interview websites. These sites prompt users to 'fix' non-existent camera issues, tricking them into downloading malware disguised as Nvidia software updates. The malware deploys a Node.js environment and executes BeaverTail, a common Lazarus tool. On Windows 11 systems, an additional backdoor (drvUpdate.exe) is installed. The attack also affects macOS users. The malware establishes persistence and connects to command and control servers for further instructions and data exfiltration.
OPENCTI LABELS :
phishing,macos,social engineering,windows,node.js,clickfix,beavertail,invisibleferret,apt-q-1
AI COMMENTARY :
1. Introduction to Traps Beneath Fault Repair: Analysis of Recent Attacks Using ClickFix Technique In the ever-evolving landscape of threat intel, the report titled “Traps Beneath Fault Repair: Analysis of Recent Attacks Using ClickFix Technique” unveils a sophisticated phishing campaign orchestrated by the Lazarus group. Known in some circles as apt-q-1, this APT actor with suspected East Asian origins has shifted tactics to exploit job seekers by engineering fake interview portals. Their goal is to trick targets into downloading malicious payloads masked as legitimate Nvidia software updates, infecting both Windows and macOS environments.
2. The ClickFix Social Engineering Approach At the heart of this operation lies the ClickFix technique, a clever social engineering ploy that preys on user trust and technical curiosity. Victims receive enticing job offers and are directed to an interview site that claims to require a working camera. When the site reports a camera malfunction, users are prompted to download what appears to be a driver update. This innocuous prompt lures them into executing malware disguised under the Nvidia banner, effectively bypassing suspicion and security mechanisms.
3. Malware Deployment via Node.js and BeaverTail Once the malicious installer executes, it unpacks a Node.js runtime environment that serves as a platform for further payload delivery. Within this environment, Lazarus deploys BeaverTail, a well-known backdoor tool favored by the group. BeaverTail establishes a covert channel to remote servers, enabling the attackers to issue commands, exfiltrate sensitive data, and maintain a persistent foothold within the compromised network.
4. Windows 11 Specific Backdoor: drvUpdate.exe On systems running Windows 11, the operation escalates with the installation of an additional backdoor known as drvUpdate.exe. This component installs kernel-level drivers to ensure deep persistence, evading standard user-mode defenses and persisting across reboots. By leveraging advanced privileges, drvUpdate.exe facilitates stealthy data collection and communication with command and control infrastructure, all while remaining largely undetected by conventional antivirus solutions.
5. Impact on macOS Users and InvisibleFerret Connections Despite its strong focus on Windows, the campaign also targets macOS users, distributing malware tailored for Apple’s ecosystem. Infection on macOS triggers a parallel implant sometimes referred to as InvisibleFerret, enabling attackers to harvest credentials, monitor user activity, and relay information back to Lazarus-controlled servers. This cross-platform approach highlights the group’s adaptability and commitment to broadening its victim pool.
6. Persistence Mechanisms and Command and Control Operations After initial compromise, the deployed malware components create multiple persistence mechanisms, including scheduled tasks, registry modifications, and launch agents on macOS. The implants regularly reach out to predefined command and control servers to receive instructions, upload harvested data, and download additional modules. This continuous back-and-forth communication underscores the campaign’s sophistication and the threat it poses to financial institutions and cryptocurrency exchanges.
7. Strategic Recommendations for Threat Intel Teams To defend against such elaborate social engineering campaigns, threat intel teams should prioritize real-time phishing detection and user awareness training focused on spear-phishing and fake technical support lures. Monitoring for unusual Node.js processes, unexpected driver installations, or unauthorized launch agents can help detect BeaverTail and InvisibleFerret implants early. Integrating threat feeds that track Lazarus group infrastructure and clickfix indicators of compromise will bolster incident response and reduce the risk of data exfiltration by this persistent APT actor.
OPEN NETMANAGEIT OPENCTI REPORT LINK!
Use public read only username and password on login page.
NOTE : Use Public READ only user credentials on login page banner.
Traps Beneath Fault Repair: Analysis of Recent Attacks Using ClickFix Technique