Recent OTX pulses indicate a convergence of advanced evasion techniques and social engineering in ongoing APT campaigns. We observe three distinct clusters: ClickFix campaigns distributing commodity infostealers (Vidar, Lumma) via social engineering; GlassWorm, a supply-chain attack targeting developers using Solana blockchain for C2; and EtherRAT, a North Korean APT-linked Node.js backdoor utilizing "EtherHiding" on Ethereum smart contracts for resilient infrastructure.
Collectively, these threats demonstrate a shift toward living-off-the-land (LotL) initial access and blockchain-abuse for infrastructure resilience, specifically targeting sectors handling high-value financial and intellectual property assets.
Threat Actor / Malware Profile
1. ClickFix Campaigns (Unknown Actor)
- Objective: Initial access leading to credential theft and financial fraud.
- Distribution: Social engineering (SEO poisoning) impersonating Intuit QuickBooks, Booking.com, and other services.
- Technique (ClickFix): Manipulates victims into executing malicious commands via native system tools (e.g., PowerShell, CMD) to bypass detections.
- Payloads: Vidar, Lumma Stealer, Odyssey Stealer, Redline Stealer, NetSupport RAT.
- Evasion: Living-off-the-land binaries (LOLBins) and obfuscation.
2. GlassWorm (Supply Chain Actor)
- Objective: Long-term surveillance and cryptocurrency theft from developers.
- Target: Software developers via compromised code repositories/package managers.
- Behavior: Multi-stage infection. Performs machine fingerprinting and fetches payloads via the Solana blockchain to hide C2 traffic.
- Payload: Installs a Remote Access Trojan (RAT) and infostealer targeting crypto wallets and dev credentials.
3. EtherRAT (North Korean APT)
- Objective: Cyber espionage and asset theft within Retail, Finance, and Business Services.
- Infrastructure: Uses EtherHiding—storing C2 addresses inside Ethereum smart contracts. This renders takedowns ineffective as the domain is hosted on-chain.
- Malware: Node.js-based backdoor with a SYS_INFO module.
- Communication: "CDN-like beaconing" to blend in with legitimate web traffic.
IOC Analysis
The pulses provide 150+ indicators, predominantly domains used in the ClickFix and EtherRAT campaigns. GlassWorm indicators were restricted, suggesting high sensitivity or ongoing operations.
-
Indicator Types:
- Domains: Used for initial infection vectors (ClickFix) and callback infrastructure (EtherRAT).
- Hostnames: Observed in EtherRAT C2 chains (e.g.,
rpc.payload.de).
-
Operational Guidance:
- Firewalls & Proxies: Immediately block the listed domains at the perimeter.
- DNS Monitoring: Hunt for DNS queries resolving to the specific domains listed below. Note that EtherRAT may involve domains resolving to IPs hosted on Ethereum, but the initial listed domains (e.g.,
o-parana.com) are actionable. - Tooling: SOC teams should ingest these into SIEM correlation engines (Splunk, Sentinel, Elastic) to match against
DeviceNetworkEventsandDnsEvents.
Detection Engineering
The following detection logic targets the specific behaviors of ClickFix (browser-to-shell), EtherRAT (Node.js C2), and GlassWorm (Dev environment abuse).
title: Potential ClickFix Social Engineering Activity
id: 6a83e2a4-9b12-4c18-8b88-8f1c8f1c8f1c
description: Detects browsers spawning shell processes (PowerShell or CMD), indicative of ClickFix campaigns where users are manipulated into copying/pasting malicious commands.
status: experimental
date: 2026/04/28
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/6a83e2a4
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|endswith:
- '\chrome.exe'
- '\msedge.exe'
- '\firefox.exe'
Image|endswith:
- '\powershell.exe'
- '\cmd.exe'
- '\wscript.exe'
condition: selection
falsepositives:
- Legitimate IT support tools
level: high
tags:
- attack.initial_access
- attack.t1566.001
---
title: Suspicious Node.js Process with Network Connection (EtherRAT)
id: 7b94f3b5-0c23-5d29-9c99-9g2d9g2d9g2d
description: Detects Node.js processes initiating network connections, a hallmark of the EtherRAT backdoor and other Node-based malware.
status: experimental
date: 2026/04/28
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/7b94f3b5
logsource:
category: network_connection
product: windows
detection:
selection:
Image|endswith: '\node.exe'
Initiated: 'true'
filter_legit:
DestinationPort:
- 80
- 443
- 8080
condition: selection and not filter_legit
falsepositives:
- Local development servers
level: medium
tags:
- attack.command_and_control
- attack.t1071
---
title: Developer Tool Spawning Shell (GlassWorm Indicator)
id: 8c05g4c6-1d34-6e30-0d00-0h3e0h3e0h3e
description: Detects package managers or IDEs spawning shell processes, potentially indicating supply chain compromise like GlassWorm.
status: experimental
date: 2026/04/28
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/8c05g4c6
logsource:
category: process_creation
product: windows
detection:
selection_parent:
ParentImage|contains:
- '\npm.exe'
- '\node.exe'
- '\code.exe'
selection_child:
Image|endswith:
- '\powershell.exe'
- '\cmd.exe'
- '\bash.exe'
condition: selection_parent and selection_child
falsepositives:
- Legitimate build scripts
level: high
tags:
- attack.execution
- attack.t1059.001
kql
// Hunt for ClickFix and EtherRAT Network Activity
// Look for browsers triggering shells and Node.exe connections to suspicious domains
DeviceNetworkEvents
| where Timestamp > ago(7d)
| where RemoteUrl in (
'ustazazharidrus.com', 'account-help.info', 'quiptly.com', 'elive123go.com',
'visitbundala.com', 'nhacaired88.com', 'subsgod.com', 'ariciversontile.com',
'o-parana.com', 'jariosos.com', 'hayesmed.com', 'regancontrols.com',
'salinasrent.com', 'justtalken.com', 'mebeliotmasiv.com'
)
| project Timestamp, DeviceName, InitiatingProcessFileName, InitiatingProcessParentFileName, RemoteUrl, RemoteIP
| extend HuntContext = iif(InitiatingProcessFileName in ('chrome.exe', 'msedge.exe', 'firefox.exe'), "Potential ClickFix Referral",
iif(InitiatingProcessFileName == 'node.exe', "Potential EtherRAT/GlassWorm C2", "Other Network Activity"))
powershell
# IOC Hunt Script - ClickFix and EtherRAT Domains
# Checks DNS Cache and Recent Network Connections for OTX Indicators
$TargetDomains = @(
"ustazazharidrus.com", "account-help.info", "quiptly.com", "elive123go.com",
"visitbundala.com", "nhacaired88.com", "subsgod.com", "ariciversontile.com",
"o-parana.com", "rpc.payload.de", "jariosos.com", "hayesmed.com",
"regancontrols.com", "salinasrent.com", "justtalken.com", "mebeliotmasiv.com"
)
Write-Host "[+] Checking DNS Cache for malicious domains..." -ForegroundColor Cyan
$DnsCache = Get-DnsClientCache | Where-Object { $TargetDomains -contains $_.Entry }
if ($DnsCache) {
Write-Host "[!] ALERT: Found malicious domain entries in DNS Cache:" -ForegroundColor Red
$DnsCache | Format-Table Entry, Data, Type -AutoSize
} else {
Write-Host "[-] No suspicious entries in local DNS cache." -ForegroundColor Green
}
Write-Host "\n[+] Checking for active Node.js processes (EtherRAT/GlassWorm) ..." -ForegroundColor Cyan
$NodeProcesses = Get-Process -Name "node" -ErrorAction SilentlyContinue
if ($NodeProcesses) {
Write-Host "[!] WARNING: Node.js processes running. Verify legitimacy." -ForegroundColor Yellow
$NodeProcesses | Format-Table Id, ProcessName, Path -AutoSize
} else {
Write-Host "[-] No Node.js processes detected." -ForegroundColor Green
}
# Response Priorities
* **Immediate (0-24h):**
* Block all listed domains at the DNS sinkhole and Proxy level.
* Scan endpoints for the presence of `node.exe` processes outside of approved development environments.
* Hunt for `powershell.exe` or `cmd.exe` processes with parent images matching browsers (Chrome, Edge, Firefox).
* **24 - 48 Hours:**
* **Identity Verification:** If Lumma, Vidar, or Redline Stealer are suspected, force a password reset and enable MFA for all accounts accessed from infected endpoints.
* **Developer Audit:** For GlassWorm targetting, audit package dependencies (`package.`) for obfuscated or recently added modules.
* **1 Week:**
* **Architecture Hardening:** Implement Application Control (AppLocker) to prevent browsers from spawning shell processes.
* **Network Segmentation:** Restrict developer workstation access to the public internet, specifically blocking access to known blockchain RPC endpoints unless business-justified.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.