Cybercriminals Use ClickFix and Steganography to Hide Malware in Images, Evading Detection

Cybercriminals Exploit ClickFix and Steganography to Conceal Malware in Images

In a concerning development, cybercriminals have combined the deceptive ClickFix social engineering technique with advanced steganography to embed malicious code within PNG image files. This sophisticated method, identified by Huntress analysts, marks a significant evolution in malware delivery strategies, enabling attackers to deploy information-stealing software while evading traditional detection mechanisms.

Understanding the ClickFix Technique

ClickFix is a multi-stage attack chain that manipulates users into executing harmful commands via the Windows Run prompt. The attack typically begins when a user encounters a convincing lure, such as a fake robot verification screen or a counterfeit Windows Update notification. These deceptive pages instruct the user to press the Windows key + R to open the Run dialog box and paste a command that has been automatically copied to their clipboard. Once executed, this command initiates a sequence of events leading to malware installation on the victim’s system.

Evolution of the Attack Strategy

Initially, attackers employed Human Verification lures to deceive users. However, recent campaigns have shifted to more convincing fake Windows Update screens. These full-screen displays mimic legitimate Microsoft updates, complete with realistic Working on updates animations, before prompting the user to execute the ClickFix command. This evolution underscores the attackers’ commitment to refining their social engineering tactics to increase the success rate of their campaigns.

Steganography: Concealing Malware Within Images

A particularly alarming aspect of this campaign is the use of steganography to hide the final stages of the malware within PNG image files. Unlike traditional methods that append malicious data to images, the attackers employ a custom steganographic algorithm to encode shellcode directly within the pixel data. This technique focuses on specific color channels—primarily the red channel—to reconstruct and decrypt the payload entirely in memory, thereby avoiding detection by conventional security tools.

Technical Breakdown of the Attack Chain

1. Initial Execution: The attack begins with an `mshta.exe` command containing a hex-encoded IP address in its second octet.

2. PowerShell Loader Activation: This command triggers a PowerShell loader that dynamically decrypts and reflectively loads a .NET assembly.

3. Steganographic Extraction: The .NET assembly acts as a steganographic loader, extracting shellcode hidden within an encrypted PNG image embedded as a manifest resource.

4. Shellcode Deployment: The extraction process involves calculating offsets for each row and column of the bitmap’s raw pixel data, then XORing the red channel value with 114 to recover the encrypted shellcode bytes.

5. Final Payload Execution: The extracted shellcode is packed using Donut, a shellcode packer that enables in-memory .NET assembly execution.

This intricate process culminates in the deployment of information-stealing malware such as LummaC2 and Rhadamanthys, designed to harvest sensitive user credentials and financial information.

Implications and Recommendations

The integration of ClickFix with steganography represents a significant advancement in cybercriminal tactics, complicating detection and analysis efforts. By embedding malicious payloads within image pixel data rather than traditional file structures, attackers can evade signature-based detection systems more effectively.

However, the success of this attack still hinges on social engineering—convincing users to manually execute commands. To mitigate the risk posed by such sophisticated attacks, organizations should:

– Enhance User Awareness Training: Educate employees about the dangers of executing unsolicited commands and recognizing social engineering attempts.

– Restrict Use of the Windows Run Box: Consider disabling the Windows Run dialog box through registry modifications or Group Policy settings to prevent unauthorized command execution.

– Implement Advanced Threat Detection Solutions: Deploy security tools capable of identifying and mitigating steganographic techniques and in-memory execution methods.

By adopting these measures, organizations can bolster their defenses against the evolving landscape of cyber threats that exploit human behavior and advanced concealment techniques.