New FileFix Social Engineering Attack Delivers StealC Malware

Fake Facebook Security Pages Used in Sophisticated StealC Malware Phishing Campaign with Steganography and AutoHotkey Variants

  • New phishing campaign uses a social engineering tactic called FileFix to distribute StealC Malware.
  • Attackers exploit fake Facebook Security pages, convincing users to run harmful commands that install malware.
  • The method hides malicious commands by mimicking regular file paths, increasing success rates.
  • Researchers observed attackers using steganography—hiding code inside images—to avoid detection.
  • Variants of this attack include AutoHotkey scripts and clipboard hijacking, expanding the range of threats.

A new cyber threat campaign uses a variant of the FileFix technique to trick users into downloading the StealC information-stealer malware. The attacks focus on distributing malicious files through phishing sites that look like Facebook Security pages, often redirecting victims after they receive warning emails about account suspension.

- Advertisement -

Acronis researcher Eliad Kimhy reported that the campaign stands out for its convincing, multi-language phishing sites. Attackers use advanced methods such as code obfuscation and steganography (concealing information inside images) to evade detection. The phishing process starts by urging users to appeal alleged Facebook policy violations, luring them into copying what appears to be a harmless file path into their computer’s File Explorer address bar.

According to Acronis, the command copied by victims is not just a file path but a hidden malicious command. This command runs a PowerShell script that downloads an image from a Bitbucket repository. The image, while seemingly innocent, contains malware components. “The observed campaign uses a highly convincing, multilingual phishing site (e.g., fake Facebook Security page), with anti-analysis techniques and advanced obfuscation to evade detection,” Kimhy said in the full report.

Previous campaigns relied on the ClickFix technique that required users to paste commands into the Windows Run dialog. FileFix instead uses the browser’s regular file upload feature, making the process simpler and more likely to bypass administrator controls. “The adversary behind this attack demonstrated significant investment in tradecraft, carefully engineering the phishing infrastructure, payload delivery and supporting elements to maximize both evasion and impact,” Acronis reported.

The payload ultimately installs StealC, a tool that collects sensitive information from infected systems. Other observed variants include the use of AutoHotkey (AHK) scripts and clipboard hijacking. These approaches allow attackers to collect user data or install additional remote administration tools like AnyDesk and TeamViewer.

- Advertisement -

Researchers note that while Attackers’ new methods are effective at tricking users, the browser-based execution stands out in forensic investigations, potentially making it more detectable compared to older methods. There have also been cases of attackers leading victims to run Windows commands from sites pretending to be Google.

AutoHotkey, commonly used for automating Windows tasks, has been adopted by threat actors since 2019 for creating lightweight malware. These scripts can appear as harmless support tools but are designed to profile computers and install additional malicious software.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Bitcoin’s AI Job Warning Flashes Red for Economy

Bitmex co-founder Arthur Hayes argues Bitcoin's recent decline while the Nasdaq stays flat is...

Digital Chamber Forms Group for US Prediction Markets

The Digital Chamber launches a Prediction Markets Working Group to advocate for federal regulatory...

9th Circuit Denies Kalshi’s Stay Request

The Ninth Circuit Court of Appeals denied Kalshi's emergency request for a stay on...

Nvidia sells entire $177M stake in Applied Digital: filing

NVIDIA sold its entire $177 million stake in Applied Digital by the end of...

Institutions Shift Capital from Bitcoin to Ethereum ETFs

Institutional sentiment is shifting toward Ethereum as elite funds like the Harvard endowment reallocate...

Must Read

What Is Bcrypt Password Hashing Function?

KEY TAKEAWAYSBcrypt is a password hashing function that transforms plain passwords into unique alphanumeric sequences.It is a one-way process, ensuring that passwords cannot be...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!