Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Mozilla Patches Firefox 0-Days Using Claude Mythos
May 8, 2026
Critical Spring Vulnerabilities Expose Arbitrary Files and GCP Secrets
May 8, 2026
Dirty Frag Linux Vulnerability Allows Root Privileges Access
May 8, 2026
Home/Threats/ClickFix Lure Drops Node.js Windows RAT with Tor Hackers Node.js-Based
Threats

ClickFix Lure Drops Node.js Windows RAT with Tor Hackers Node.js-Based

A new wave of cyberattacks is targeting Windows users, deploying a Node.js-based Remote Access Trojan (RAT) through a social engineering technique dubbed ClickFix. Attackers trick victims with a fake...

Sarah simpson
Sarah simpson
April 7, 2026 3 Min Read
4 0

A new wave of cyberattacks is targeting Windows users, deploying a Node.js-based Remote Access Trojan (RAT) through a social engineering technique dubbed ClickFix. Attackers trick victims with a fake browser verification page, coercing them into executing a hidden command that quietly installs the RAT onto their systems.

The malware then communicates with its operators through the Tor network, masking its traffic and making the attacker’s infrastructure nearly impossible to trace or shut down.

ClickFix first emerged as a notable delivery method in early 2025, when threat actors used it to push well-known malware families such as LegionLoader and LummaStealer onto victim machines.

The technique works by displaying a fake CAPTCHA or identity check page, then instructing the user to manually copy and run a command from their clipboard.

In this latest campaign, that command executes a base64-encoded PowerShell script that downloads a malicious installer file, NodeServer-Setup-Full.msi, from a fraudulent domain and installs it silently in the background without displaying any visible prompts.

Researchers at Netskope Threat Labs identified and tracked this campaign, noting that it stands clearly apart from earlier ClickFix operations due to its more sophisticated overall design.

The RAT is built on a modular Node.js framework, meaning its most dangerous capabilities are never stored on the victim’s hard drive. They are delivered entirely in memory only after the malware establishes a successful connection to its command-and-control server, which allows it to sidestep traditional security scans with relative ease.

What makes this campaign particularly alarming is the criminal infrastructure supporting it. The attackers built a Malware-as-a-Service platform that multiple operators can access and deploy against their own sets of victims.

An operational security mistake by the threat actors accidentally exposed the server-side admin panel, which revealed features for tracking cryptocurrency wallets, managing multiple operators with role-based access controls, pushing custom modules to infected machines, and sending real-time Telegram alerts whenever a new victim connects.

The malware also builds a thorough profile of each compromised machine, collecting the operating system version, hardware details, geographic location, external IP address, and a full list of security tools currently running on the system. This fingerprinting step helps operators decide which victims are worth pursuing further.

The malware actively checks for more than 30 antivirus and endpoint security products, including CrowdStrike, Kaspersky, SentinelOne, and Windows Defender.

How the Infection Persists and Communicates

Once the MSI installer runs, the malware extracts its files into the %LOCALAPPDATA%LogicOptimizer folder and registers a persistence entry under the Windows Registry Run key, so it starts automatically each time the user logs in.

It uses conhost.exe in headless mode to silently launch Node.js, keeping the entire process invisible to the user. This approach avoids any taskbar or window alerts that could raise suspicion and reveal the infection.

Before connecting to its C2 server, the malware runs through multiple layers of decryption using AES-256-CBC and XOR methods to uncover its full configuration data.

The encryption keys are also reshuffled on every execution, which prevents analysts from reverse-engineering the config through static methods. Once decrypted, the configuration reveals a .onion Tor hidden service address as the C2 server destination.

To reach that server, the malware downloads the Tor Expert Bundle directly from the official Tor Project website and creates a SOCKS5 proxy on the local machine.

It then connects using gRPC, a streaming protocol that allows real-time two-way communication between the infected machine and the C2 operator.

All theft modules and commands are pushed from the server as JavaScript strings, executed in a Node.js sandbox in memory, and never written to disk. A built-in watchdog process monitors the connection and automatically restarts it if it drops.

Security teams should monitor endpoints for unexpected Node.js or conhost.exe processes, unusual Tor traffic on the network, and any new entries added under Registry Run keys.

Organizations should also block outbound connections to .onion domains and flag any MSI files silently downloaded through PowerShell.

User awareness training remains critical, as ClickFix attacks rely entirely on tricking individuals into running commands they do not understand.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwareSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Russian Hackers Hijack Home/SOH Exploiting Small-office

Next Post

Hackers Exploit Next.js React2Shell Flaw to Steal Credentials From

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Cisco Network Vulnerability Allows Remote DoS Attacks
May 7, 2026
CISA Warns of Palo Alto PAN-OS Vulnerability Exploited to Gain
May 7, 2026
Hackers Use Fake Claude AI Installers to Infect Systems
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us