Recent OTX pulses indicate a surge in sophisticated multi-vector threats targeting enterprise environments. This brief synthesizes intelligence on three distinct but concerning activities: the TwizAdmin operation (DataBreachPlus) blending crypto-clipping with ransomware; widespread ClickFix campaigns delivering commodity stealers like Lumma and Vidar; and the DinDoor backdoor attributed to MuddyWater, exploiting the Deno runtime. Collectively, these campaigns highlight a trend toward abusing legitimate runtimes (Deno) and living-off-the-land (LotL) techniques (ClickFix) to evade detection while maximizing financial theft or espionage.
Threat Actor / Malware Profile
1. DataBreachPlus (TwizAdmin)
- Type: Crime / MaaS (Malware-as-a-Service)
- Malware: TwizAdmin, crpx0 (Ransomware)
- Capabilities: Multi-platform (Windows/macOS) malware featuring a clipboard hijacker for 8+ cryptocurrency chains, BIP-39 seed phrase theft, and browser credential exfiltration. It utilizes a Java RAT builder and a FastAPI-based C2 panel with a license key system.
- Delivery: FedEx-themed lures targeting corporate logistics and finance.
2. MuddyWater (DinDoor)
- Type: APT / Nation-State
- Malware: DinDoor, CastleLoader, CastleRAT
- Capabilities: A backdoor leveraging the Deno JavaScript/TypeScript runtime. It executes obfuscated JavaScript for C2 communication and system fingerprinting. Variants include disk-based or in-memory execution using CastleLoader components.
- Delivery: Malicious MSI installers, often utilizing Caddy proxy infrastructure.
3. ClickFix Campaign Operators
- Type: Cybercrime / Initial Access Brokers
- Malware: Vidar, Lumma Stealer, Redline, NetSupport RAT
- Capabilities: A social engineering technique tricking users into executing "fix" commands in native tools (PowerShell/Terminal). This bypasses traditional security controls by abusing legitimate system binaries.
- Delivery: SEO poisoning and impersonation of brands like QuickBooks and Booking.com.
IOC Analysis
-
Indicator Types:
- Network Infrastructure: C2 IPs (e.g.,
31.31.198.206) and domains utilizing generic TLDs (.xyz,.cyou,.site). - File Artifacts: SHA256 hashes for payloads, MD5/SHA1 for legacy compatibility.
- URLs: Distribution paths for malicious files (e.g.,
https://fanonlyatn.xyz/files/).
- Network Infrastructure: C2 IPs (e.g.,
-
Operational Guidance:
- Blocking: Immediate ingestion of IPs and Domains into perimeter firewalls and secure web gateways (SWG).
- Hunting: Use EDR solutions to hunt for the specific file hashes provided. Focus on processes spawned from browsers (
chrome.exe,msedge.exe) or installers (msiexec.exe) that initiate network connections to the listed C2 infrastructure. - Decoding: The Deno-based payloads require JavaScript analysis environments; standard disassemblers may be insufficient.
Detection Engineering
Sigma Rules
title: Potential ClickFix Activity - Browser Spawning Shell
id: 4f3e1a2b-6c9d-4a1e-9b2c-3d4e5f6a7b8c
date: 2026/04/25
status: experimental
description: Detects potential ClickFix social engineering activity where a browser process spawns a shell (PowerShell, Bash, CMD) often triggered by fake error messages.
references:
- https://otx.alienvault.com/pulse/6265c8d0e7e46166c8e3f1e2/
author: Security Arsenal
tags:
- attack.initial_access
- attack.execution
- attack.t1059.001
- attack.t1566.001
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|endswith:
- '\chrome.exe'
- '\msedge.exe'
- '\firefox.exe'
Image|endswith:
- '\powershell.exe'
- '\cmd.exe'
- '\wsl.exe'
filter:
CommandLine|contains:
- 'youtube-dl' # Legitimate use case
- 'vlc'
condition: selection and not filter
falsepositives:
- Legitimate web-based utilities launching command lines
level: high
---
title: DinDoor Backdoor - Deno Runtime Execution via Installer
id: 5a4b2c1d-7d0e-5f2a-0c3d-4e5f6a7b8c9d
date: 2026/04/25
status: experimental
description: Detects the execution of the Deno runtime immediately following an MSI installer, characteristic of the DinDoor backdoor delivery used by MuddyWater.
references:
- https://otx.alienvault.com/pulse/6265c8d0e7e46166c8e3f1e4/
author: Security Arsenal
tags:
- attack.execution
- attack.t1059.006
logsource:
category: process_creation
product: windows
detection:
selection_parent:
Image|endswith: '\msiexec.exe'
selection_child:
Image|contains: '\deno.exe'
CommandLine|contains: 'run'
condition: selection_parent and selection_child
falsepositives:
- Legitimate software development using Deno installed via MSI
level: critical
---
title: TwizAdmin C2 Connection - FastAPI Panel Traffic
id: 6b5c3d2e-8e1f-6a3b-1d4e-5f6a7b8c9d0e
date: 2026/04/25
status: experimental
description: Detects network connections to known TwizAdmin FastAPI C2 panels or suspicious traffic on port 1337 associated with the DataBreachPlus operation.
references:
- https://otx.alienvault.com/pulse/6265c8d0e7e46166c8e3f1e0/
author: Security Arsenal
tags:
- attack.c2
- attack.t1071.001
logsource:
category: network_connection
product: windows
detection:
selection_port:
DestinationPort: 1337
selection_ioc:
DestinationHostname|contains:
- 'fanonlyatn.xyz'
condition: 1 of selection*
falsepositives:
- Legitimate traffic on non-standard ports
level: medium
KQL (Microsoft Sentinel)
// Hunt for ClickFix and DinDoor IOCs
let IOCs = dynamic(["fanonlyatn.xyz", "ustazazharidrus.com", "account-help.info", "ineracaspsl.site", "serialmenot.com", "justtalken.com", "31.31.198.206"]);
// Network Events
DeviceNetworkEvents
| where RemoteUrl in (IOCs) or RemoteIP in (IOCs)
| project Timestamp, DeviceName, InitiatingProcessFileName, RemoteUrl, RemoteIP, RemotePort
| extend ThreatType = iff(RemotePort == 1337, "TwizAdmin C2", "General C2")
| order by Timestamp desc
;
// Process Creation for Deno/Msiexec chain
DeviceProcessEvents
| where InitiatingProcessFileName =~ "msiexec.exe" and FileName =~ "deno.exe"
| project Timestamp, DeviceName, InitiatingProcessCommandLine, CommandLine, FolderPath
| order by Timestamp desc
;
PowerShell Hunt Script
<#
Security Arsenal Threat Hunt - TwizAdmin & DinDoor
Checks for active network connections to known malicious IPs/Domains
and suspicious Deno runtime processes.
#>
$TargetIOCs = @(
"31.31.198.206",
"103.241.66.238"
)
Write-Host "[+] Checking Active Network Connections to Known C2s..." -ForegroundColor Cyan
$Connections = Get-NetTCPConnection -State Established -ErrorAction SilentlyContinue
foreach ($IP in $TargetIOCs) {
$Match = $Connections | Where-Object { $_.RemoteAddress -eq $IP }
if ($Match) {
$Process = Get-Process -Id $Match.OwningProcess -ErrorAction SilentlyContinue
Write-Host "[!] ALERT: Connection to $IP found!" -ForegroundColor Red
Write-Host " Local Address: $($Match.LocalAddress):$($Match.LocalPort)" -ForegroundColor Yellow
Write-Host " Process: $($Process.ProcessName) (PID: $($Match.OwningProcess))" -ForegroundColor Yellow
Write-Host " Path: $($Process.Path)" -ForegroundColor Yellow
}
}
Write-Host "[+] Checking for Deno Runtime Processes (DinDoor)..." -ForegroundColor Cyan
$DenoProcesses = Get-Process -Name "deno" -ErrorAction SilentlyContinue
if ($DenoProcesses) {
Write-Host "[!] ALERT: Deno runtime detected. Investigate parent chain." -ForegroundColor Red
$DenoProcesses | ForEach-Object {
$Parent = Get-Process -Id $_.Parent.ProcessId -ErrorAction SilentlyContinue
Write-Host " PID: $($_.Id), Parent: $($Parent.ProcessName), Path: $($_.Path)" -ForegroundColor Yellow
}
} else {
Write-Host "[-] No Deno processes found." -ForegroundColor Green
}
# Response Priorities
Immediate
- Block IOCs: Push all listed IPs, Domains, and URLs to firewall blocklists and secure web gateways.
- Hunt DinDoor: Scan endpoints for
deno.exeexecution or MSI installers from the last 48 hours.
24 Hours
- Credential Audit: If TwizAdmin or Lumma/Vidar infection is suspected, force a password reset for browser-saved credentials and cryptocurrency wallets.
- Isolate: Isolate hosts with confirmed C2 connections (
31.31.198.206,fanonlyatn.xyz) for forensic imaging.
1 Week
- Runtime Restriction: Restrict the usage of the Deno runtime and FastAPI panels to developer-approved environments only.
- User Awareness: Conduct security awareness training regarding the "ClickFix" technique (fake browser errors asking to run commands).
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.