Recent OTX pulses indicate a convergence of sophisticated social engineering and blockchain-resilient C2 infrastructure targeting multiple sectors. Three distinct threat clusters have been identified:
- ClickFix Campaigns: A surge in "living-off-the-land" (LotL) initial access vectors impersonating brands like Intuit QuickBooks and Booking.com. These campaigns manipulate users into executing malicious commands in native tools (PowerShell/Bash), leading to infections by Lumma Stealer, Vidar, Odyssey Stealer, and Redline Stealer.
- GlassWorm: A supply-chain attack specifically targeting developers. It utilizes compromised package managers and code repositories to deploy a RAT and infostealer that communicates via the Solana blockchain to evade takedowns.
- EtherRAT (North Korean APT): A Node.js-based backdoor detected in retail environments using "EtherHiding"—storing C2 addresses within Ethereum smart contracts. It employs CDN-like beaconing to blend in with normal web traffic.
Collectively, these campaigns highlight a shift toward abusing legitimate blockchain infrastructure for C2 resilience and utilizing social engineering to bypass traditional endpoint controls.
Threat Actor / Malware Profile
ClickFix (Unknown Adversary)
- Distribution: Social engineering via fake browser error pages (e.g., "Fix Chrome") and fake support portals for travel/finance software.
- Payload Behavior: Victims are tricked into running obfuscated PowerShell or Bash commands. This leads to the download of info-stealers (Lumma, Vidar).
- C2 Communication: Standard HTTP/HTTPS to compromised domains; distinct for using high-reputation or newly registered domains to host payloads.
- Objective: Initial access leading to credential harvesting and financial theft.
GlassWorm
- Distribution: Supply chain compromise via developer code repositories and package managers.
- Payload Behavior: Multi-stage execution. Initial footprinting leads to payload retrieval from the Solana blockchain. Installs a fake browser extension for surveillance and a Remote Access Trojan (RAT).
- Persistence: Browser extension injection and likely developer environment configuration modification.
- Objective: Long-term surveillance of developers, theft of cryptocurrency keys, and source code exfiltration.
EtherRAT (North Korean APT)
- Distribution: IT support scams and phishing.
- Payload Behavior: Node.js based backdoor. Uses a
SYS_INFOmodule for host fingerprinting. - C2 Communication (EtherHiding): C2 infrastructure is resilient; addresses are retrieved from Ethereum smart contract transaction data. Uses CDN-like beaconing (mimicking legitimate web traffic).
- Objective: Arbitrary command execution, asset theft, and espionage within retail and software sectors.
IOC Analysis
The provided pulses offer a mix of network infrastructure indicators critical for detection and blocking.
- Types: Primarily domains and hostnames. No file hashes were provided in the restricted samples, requiring behavioral detection for the payloads.
- Operationalization:
- DNS Firewall: Immediately block the listed domains (e.g.,
ustazazharidrus.com,o-parana.com). - EDR/Network Monitoring: Hunt for
node.exeprocesses (EtherRAT) and PowerShell commands spawned by browsers (ClickFix). - Blockchain Traffic: While not an IOC in the traditional sense, unexpected traffic to Solana or Ethereum RPC endpoints from non-crypto employee workstations should be investigated.
- DNS Firewall: Immediately block the listed domains (e.g.,
- Tooling: Use
curlordigto check the resolution status of these domains within your environment to ensure DNS sinks are working.
Detection Engineering
YAML
title: Potential ClickFix Social Engineering Activity
id: 8c5b3c1d-7a2f-4e9d-b1c0-2f9e5a1b4c3d
description: Detects suspicious PowerShell execution spawned by browsers, a common indicator of ClickFix campaigns where users are tricked into pasting commands.
status: experimental
date: 2026/04/28
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/6601a2f1e7683e4e4b4b4b4b/
tags:
- attack.initial_access
- attack.execution
- attack.t1204
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|endswith:
- '\chrome.exe'
- '\msedge.exe'
- '\firefox.exe'
Image|endswith:
- '\powershell.exe'
- '\cmd.exe'
filter_legit:
CommandLine|contains: 'OneDrive' # Common legitimate sync cmd
condition: selection and not filter_legit
falsepositives:
- Legitimate admin tasks launched via browser downloads
level: high
---
title: EtherRAT Node.js Backdoor Network Activity
id: 9d6e4f2a-8b3c-4d0e-a1b2-c3d4e5f6a7b8
description: Detects Node.js processes initiating network connections, characteristic of the EtherRAT backdoor and other JS-based malware.
status: experimental
date: 2026/04/28
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/6601a2f1e7683e4e4b4b4b4c/
tags:
- attack.c2
- attack.command_and_control
- attack.t1071
logsource:
category: network_connection
product: windows
detection:
selection:
Image|endswith: '\node.exe'
Initiated: 'true'
condition: selection
falsepositives:
- Legitimate development server traffic
level: medium
---
title: GlassWorm Suspicious Developer Toolchain Execution
id: 0a1b2c3d-4e5f-6a7b-8c9d-0e1f2a3b4c5d
description: Detects execution of package managers (npm, pip) immediately followed by a shell or unusual child process, indicative of supply chain attacks like GlassWorm.
status: experimental
date: 2026/04/28
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/6601a2f1e7683e4e4b4b4b4a/
tags:
- attack.initial_access
- attack.supply_chain
- attack.t1195
logsource:
category: process_creation
product: windows
detection:
selection_parent:
Image|contains:
- '\npm.cmd'
- '\node.exe'
- '\python.exe'
selection_child:
Image|endswith:
- '\powershell.exe'
- '\cmd.exe'
- '\bash.exe'
condition: selection_parent and selection_child
falsepositives:
- Legitimate developer build scripts
level: high
kql
// Hunt for ClickFix and EtherRAT Network IOCs
// Check for connections to known malicious domains and Node.js anomalies
DeviceNetworkEvents
| where Timestamp > ago(7d)
| where (RemoteUrl in~ ("ustazazharidrus.com", "account-help.info", "quiptly.com", "elive123go.com", "visitbundala.com", "nhacaired88.com", "subsgod.com", "ariciversontile.com", "o-parana.com", "rpc.payload.de", "jariosos.com", "hayesmed.com", "regancontrols.com", "salinasrent.com", "justtalken.com", "mebeliotmasiv.com"))
or (InitiatingProcessFileName == "node.exe" and RemotePort in (80, 443, 8080))
| project Timestamp, DeviceName, InitiatingProcessAccountName, InitiatingProcessFileName, RemoteUrl, RemoteIP, RemotePort
| order by Timestamp desc
powershell
<#
.SYNOPSIS
IOC Hunt Script for ClickFix, GlassWorm, and EtherRAT Activity.
.DESCRIPTION
Checks for DNS resolution of malicious domains and scans for suspicious Node.js processes.
#>
$MaliciousDomains = @(
"ustazazharidrus.com", "account-help.info", "quiptly.com", "elive123go.com",
"visitbundala.com", "nhacaired88.com", "subsgod.com", "ariciversontile.com",
"o-parana.com", "rpc.payload.de", "jariosos.com", "hayesmed.com",
"regancontrols.com", "salinasrent.com", "justtalken.com", "mebeliotmasiv.com"
)
Write-Host "[*] Checking DNS resolution for IOCs..."
$ResolvedHosts = @()
foreach ($domain in $MaliciousDomains) {
try {
$result = Resolve-DnsName -Name $domain -ErrorAction Stop
if ($result) {
Write-Host "[!] ALERT: Resolved $domain - $(($result.IPAddress -join ', '))" -ForegroundColor Red
$ResolvedHosts += $domain
}
} catch {
# Expected for blocked/non-existent domains
}
}
if ($ResolvedHosts.Count -eq 0) {
Write-Host "[+] No malicious domains resolved." -ForegroundColor Green
}
Write-Host "`n[*] Checking for suspicious Node.js processes (EtherRAT)..."
$NodeProcesses = Get-WmiObject Win32_Process | Where-Object { $_.Name -eq "node.exe" }
if ($NodeProcesses) {
Write-Host "[!] Found Node.js processes running. Investigating network connections..." -ForegroundColor Yellow
foreach ($proc in $NodeProcesses) {
Write-Host "PID: $($proc.ProcessId), CommandLine: $($proc.CommandLine)"
}
} else {
Write-Host "[+] No Node.js processes found." -ForegroundColor Green
}
# Response Priorities
* **Immediate**:
* Block all listed domains and hostnames at the DNS Firewall and Proxy level.
* Kill any instances of `node.exe` running on non-developer workstations immediately.
* Isolate devices that triggered the "Browser spawning PowerShell" detection.
* **24 Hours**:
* Conduct credential resets for users who may have interacted with "ClickFix" prompts (look for browser history related to "booking.com", "quickbooks", or "captcha fix").
* Scan developer workstations for unauthorized browser extensions (GlassWorm indicators).
* **1 Week**:
* Implement strict allow-listing for `node.exe` and PowerShell execution paths.
* Harden build pipelines and package manager configurations to mitigate supply chain injection (GlassWorm).
* Review outbound firewall rules to restrict access to public blockchain RPC nodes (Ethereum/Solana) to authorized devices only.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
darkwebotx-pulsedarkweb-aptclickfixglasswormetherratstealersblockchain-c2
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.