Recent OTX pulses indicate a surge in sophisticated, multi-vector threats targeting enterprises, specifically focusing on financial sectors and software developers. Three distinct campaigns—ClickFix, GlassWorm, and EtherRAT—demonstrate a shift toward abusing legitimate blockchain infrastructure and social engineering to deliver stealers and Remote Access Trojans (RATs).
- ClickFix Campaigns: Unknown actors are using broad social engineering lures (fake QuickBooks/Booking.com support) to trick users into manually executing malicious commands (Living off the Land), resulting in infections by Vidar, Lumma, Redline Stealers, and NetSupport RAT.
- GlassWorm: A supply-chain adversary targeting developers. It compromises package managers/repositories to deliver a payload that fetches instructions via the Solana blockchain and persists via fake browser extensions.
- EtherRAT: A Node.js backdoor attributed to a North Korean APT group. It uses "EtherHiding" to store C2 addresses in Ethereum smart contracts, making takedowns ineffective. It targets retail and finance via IT support scams.
Threat Actor / Malware Profile
| Name | Type | Distribution | Behavior & C2 | Objective |
|---|---|---|---|---|
| ClickFix Cluster | Stealer / Loader | Social Engineering (Fake Support/Updates) | Triggers victims to paste/execute commands in PowerShell/Bash. Delivers Vidar, Lumma Stealer, Odyssey, Redline, NetSupport RAT. | Credential theft, Initial Access. |
| GlassWorm | Infostealer / RAT | Supply Chain (Compromised Repos/Code) | Fingerprinting, payload fetch via Solana blockchain, installs fake browser extension for surveillance. | Crypto wallet theft, Dev credential theft. |
| EtherRAT | Backdoor | IT Support Scams | Node.js based. Uses sys_info module for fingerprinting. C2 stored on Ethereum smart contracts (EtherHiding). CDN-like beaconing. | Espionage, Asset theft, Persistence. |
IOC Analysis
The provided IOCs are predominantly Domains and Hostnames, with a distinct lack of file hashes (likely due to obfuscation or dynamic generation in the case of the Pulse 2 restricted data).
- ClickFix Domains:
ustazazharidrus.com,account-help.info,quiptly.com,elive123go.com - EtherRAT Infrastructure:
o-parana.com,rpc.payload.de,jariosos.com,hayesmed.com
Operational Guidance: SOC teams should immediately block these domains at the perimeter and proxy levels. Given the reliance on "Living-off-the-Land" (LotL) binaries and Node.js processes, signature-based detection is less effective than behavioral hunting for unexpected PowerShell execution or unsigned Node.js processes making network connections.
Detection Engineering
Sigma Rules
title: Potential ClickFix PowerShell Execution Pattern
id: 4e2b3a0c-7b5c-4d9e-8c1f-1a2b3c4d5e6f
description: Detects PowerShell commands often used in ClickFix campaigns where users are coerced into pasting commands, specifically looking for base64 or obfuscation common in these payloads.
status: experimental
date: 2026/04/26
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/6600000000000000
tags:
- attack.execution
- attack.t1059.001
- detection.emerging_threats
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|endswith:
- '\chrome.exe'
- '\msedge.exe'
- '\firefox.exe'
Image|endswith:
- '\powershell.exe'
- '\pwsh.exe'
CommandLine|contains:
- 'CopyTo-Clipboard'
- 'iex'
- 'FromBase64String'
condition: selection
falsepositives:
- Legitimate administrative scripts
level: high
---
title: EtherRAT or GlassWorm Node.js Backdoor Activity
id: 5f3c4b1d-8c6e-5f0a-9d2e-2b3c4d5e6f7a
description: Detects Node.js processes initiating network connections, suspicious for EtherRAT (Node.js backdoor) or GlassWorm activity on endpoints where Node.js is not a standard user application.
status: experimental
date: 2026/04/26
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/6600000000000001
tags:
- attack.command_and_control
- attack.t1071.001
- detection.emerging_threats
logsource:
category: network_connection
product: windows
detection:
selection:
Image|endswith: '\node.exe'
Initiated: 'true'
filter_legit_dev:
User|contains:
- 'Administrator'
- 'SYSTEM'
condition: selection and not filter_legit_dev
falsepositives:
- Developers running legitimate node servers
level: medium
---
title: Suspicious Browser Extension Modification (GlassWorm)
id: 6a4d5c2e-9f7f-6a1b-0e3f-3c4d5e6f7a8b
description: Detects modifications to browser extension directories or registry keys indicative of GlassWorm installing a fake surveillance extension.
status: experimental
date: 2026/04/26
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/6600000000000002
tags:
- attack.persistence
- attack.t1547.001
- detection.emerging_threats
logsource:
category: registry_set
product: windows
detection:
selection:
TargetObject|contains:
- '\Software\Google\Chrome\Extensions'
- '\Software\Microsoft\Edge\Extensions'
- '\Software\Mozilla\Firefox\Extensions'
Details|contains: 'update_url'
filter:
Details|contains: 'https://clients2.google.com/service'
condition: selection and not filter
falsepositives:
- Legitimate software installing extensions
level: high
KQL (Microsoft Sentinel)
// Hunt for ClickFix and EtherRAT Network Indicators
let IoCDomains = dynamic(['ustazazharidrus.com', 'account-help.info', 'quiptly.com', 'elive123go.com', 'visitbundala.com', 'nhacaired88.com', 'subsgod.com', 'ariciversontile.com', 'o-parana.com', 'rpc.payload.de', 'jariosos.com', 'hayesmed.com', 'regancontrols.com', 'salinasrent.com', 'justtalken.com', 'mebeliotmasiv.com']);
DeviceNetworkEvents
| where RemoteUrl has_any (IoCDomains)
| project Timestamp, DeviceName, InitiatingProcessAccountName, InitiatingProcessCommandLine, RemoteUrl, RemoteIP
| extend Timestamp = format_datetime(Timestamp, 'yyyy-MM-dd HH:mm:ss')
PowerShell Hunt Script
# IOC Hunter for ClickFix and EtherRAT
$MaliciousDomains = @(
'ustazazharidrus.com', 'account-help.info', 'quiptly.com', 'elive123go.com',
'visitbundala.com', 'nhacaired88.com', 'subsgod.com', 'ariciversontile.com',
'o-parana.com', 'rpc.payload.de', 'jariosos.com', 'hayesmed.com',
'regancontrols.com', 'salinasrent.com', 'justtalken.com', 'mebeliotmasiv.com'
)
Write-Host "[+] Checking Active Network Connections for Malicious Domains..."
# Get TCP connections (requires Admin privileges)
$connections = Get-NetTCPConnection -State Established -ErrorAction SilentlyContinue
foreach ($conn in $connections) {
try {
$process = Get-Process -Id $conn.OwningProcess -ErrorAction SilentlyContinue
$remoteAddress = $conn.RemoteAddress
# Resolve IP to Hostname to check against IOC list
$hostEntry = [System.Net.Dns]::GetHostEntry($remoteAddress)
$hostname = $hostEntry.HostName
if ($MaliciousDomains -contains $hostname) {
Write-Host "[!] THREAT DETECTED: Connection to $hostname ($remoteAddress)" -ForegroundColor Red
Write-Host " - Process: $($process.ProcessName) (PID: $($conn.OwningProcess))"
Write-Host " - Path: $($process.Path)"
}
} catch {
# Ignore resolution errors or access denied
}
}
Write-Host "[+] Checking for suspicious Node.js processes..."
$nodeProcs = Get-Process -Name node -ErrorAction SilentlyContinue
if ($nodeProcs) {
foreach ($proc in $nodeProcs) {
# Check if Node is running from a non-standard user profile path (suspicious for malware)
if ($proc.Path -notlike "*Program Files*" -and $proc.Path -notlike "*AppData*\Roaming*npm*") {
Write-Host "[!] SUSPICIOUS NODE PROCESS: $($proc.Path)" -ForegroundColor Yellow
}
}
}
Write-Host "[+] Hunt complete."
Response Priorities
- Immediate: Block all listed domains and hostnames at the web proxy and firewall. Initiate a hunt for
node.exeprocesses on endpoints outside of approved developer workstations. - 24 Hours: If stealers (Lumma, Vidar) are suspected in the environment based on ClickFix activity, force a password reset for high-privilege accounts and rotate session tokens. Audit browser extensions on developer machines for GlassWorm.
- 1 Week: Implement Application Control (AppLocker) to restrict PowerShell execution to signed scripts and specific administrative users. Review policies for browser extension installation to enforce allow-listing only.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.