
ClickFix
ClickFix tactic: The Phantom Meet (Infostealers)
This blog post provides a chronological overview of the observed ClickFix campaigns. We further share technical details about a ClickFix cluster that uses fake Google
Home » ClickFix

This blog post provides a chronological overview of the observed ClickFix campaigns. We further share technical details about a ClickFix cluster that uses fake Google

Speaker: Leonid Rozenberg, Cybercrime Researcher, Hudson Rock. Infostealing malware has become a near-perfect tool for cybercriminals, enabling the theft of sensitive data with remarkable efficiency.

*Interactive simulator can be accessed via desktop – www.hudsonrock.com/northkorean In the world of Threat Intelligence, we are usually looking at the aftermath of an attack:

The Infostealer-to-APT Pipeline – Hudson Rock Infographic HUDSON ROCK THE INFOSTEALER TO APT PIPELINE How stolen diplomatic credentials fuel cyber-political power plays. The Dangerous Escalation