Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    Rediscovering the Legacy of Chemist Jan Czochralski

    February 12, 2026

    Can a Flutter app sync subscription entitlements across Android and iOS?

    February 12, 2026

    The death of reactive IT: How predictive engineering will redefine cloud performance in 10 years

    February 11, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique
    IT/ Cybersecurity

    Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique

    big tee tech hubBy big tee tech hubMay 24, 2025004 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique

    The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called ClickFix as a distribution vector.

    “The ClickFix technique is particularly risky because it allows the malware to execute in memory rather than being written to disk,” Expel said in a report shared with The Hacker News. “This removes many opportunities for browsers or security tools to detect or block the malware.”

    Latrodectus, believed to be a successor to IcedID, is the name given to a malware that acts as a downloader for other payloads, such as ransomware. It was first documented by Proofpoint and Team Cymru in April 2024.

    Incidentally, the malware is one among the many malicious software to suffer an operational setback as part of Operation Endgame, which took down 300 servers worldwide and neutralized 650 domains related to Bumblebee, Lactrodectus, QakBot, HijackLoader, DanaBot, TrickBot, and WARMCOOKIE between May 19 and 22, 2025.

    Cybersecurity

    In the latest set of Latrodectus attacks observed by Expel in May 2025, unsuspecting users are tricked into copying and executing a PowerShell command from an infected website, a tactic that has become a prevalent method to distribute a wide range of malware.

    “When run by a user, these commands will attempt to install a file located at the remote URL using MSIExec, and then execute it in memory,” Expel said. “This keeps the attacker from having to write the file to the computer and risk being detected by the browser or an antivirus that might detect it on disk.”

    The MSI installer contains a legitimate application from NVIDIA, which is used to sideload a malicious DLL, which then uses curl to download the main payload.

    To mitigate attacks of this type, it’s advised to disable the Windows Run program using Group Policy Objects (GPOs) or turn off the “Windows + R” hot key via a Windows Registry change.

    From ClickFix to TikTok

    The disclosure comes as Trend Micro revealed details of a new engineering campaign that instead of relying on fake CAPTCHA pages employs TikTok videos likely generated using artificial intelligence (AI) tools to deliver the Vidar and StealC information stealers by instructing users to run malicious commands on their systems to activate Windows, Microsoft Office, CapCut, and Spotify.

    tm

    These videos have been posted from various TikTok accounts such as @gitallowed, @zane.houghton, @allaivo2, @sysglow.wow, @alexfixpc, and @digitaldreams771. These accounts are no longer active. One of the videos claiming to provide instructions on how to “boost your Spotify experience instantly” has amassed nearly 500,000 views, with over 20,000 likes and more than 100 comments.

    The campaign marks a new escalation of ClickFix in that users searching for ways to activate pirated apps are verbally and visually guided to open the Windows Run dialog by pressing the “Windows + R” hot key, launch PowerShell, and run the command highlighted in the video, ultimately compromising their own systems.

    “Threat actors are now using TikTok videos that are potentially generated using AI-powered tools to socially engineer users into executing PowerShell commands under the guise of guiding them to activate legitimate software or unlock premium features,” security researcher Junestherry Dela Cruz said.

    Cybersecurity

    “This campaign highlights how attackers are ready to weaponize whichever social media platforms are currently popular to distribute malware.”

    Fake Ledger Apps Used to Steal Mac Users’ Seed Phrases

    The findings also follow the discovery of four different malware campaigns that leverage a cloned version of the Ledger Live app to steal sensitive data, including seed phrases, with the goal of draining victims’ cryptocurrency wallets. The activity has been ongoing since August 2024.

    The attacks make use of the malicious DMG files that, when launched, launches AppleScript to exfiltrate passwords and Apple Notes data, and then download a trojanized version of Ledger Live. Once the app is opened, it warns users of a supposed account problem and that it requires their seed phrase for recovery. The entered seed phrase is sent to an attacker-controlled server.

    moon

    Moonlock Lab, which shed light on the campaign, said the rogue apps make use of macOS stealer malware like Atomic macOS Stealer (AMOS) and Odyssey, the latter of which introduced the novel phishing scheme in March 2025. It’s worth noting that the activity overlaps with a macOS infostealer campaign that targets Ledger Live users through PyInstaller-packed binaries, as revealed by Jamf this month.

    “On dark web forums, chatter around anti-Ledger schemes is growing. The next wave is already taking shape,” MacPaw’s cybersecurity division noted. “Hackers will continue to exploit the trust crypto owners place in Ledger Live.”

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





    Source link

    ClickFix Distribute hackers Malware StealC Technique TikTok Vidar Videos
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

    February 11, 2026

    Beware of Winter Olympics scams and other cyberthreats

    February 10, 2026

    This Week in Scams: Phony AI Ads, Apple Account Takeover Attempts, and a PlayStation Scam

    February 10, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Rediscovering the Legacy of Chemist Jan Czochralski

    February 12, 2026

    Can a Flutter app sync subscription entitlements across Android and iOS?

    February 12, 2026

    The death of reactive IT: How predictive engineering will redefine cloud performance in 10 years

    February 11, 2026

    Oceanhorn 3: Legend of the Shadow Sea launches March 5 on Apple Arcade

    February 11, 2026
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    Rediscovering the Legacy of Chemist Jan Czochralski

    February 12, 2026

    Can a Flutter app sync subscription entitlements across Android and iOS?

    February 12, 2026

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2026 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.