Malicious ad blocker extension uses ‘CrashFix’ to spread new Python RAT
scworld.com·17h·
Discuss: Hacker News
🎫Kerberos Exploitation
Preview
Report Post

A malicious ad blocker extension uses a ClickFix variant dubbed “CrashFix” to spread a novel Python backdoor developed by threat actors known as KongTuke, Huntress reported Friday.

The browser extension, called NexShield, appeared in a Google Ad during a search for ad blockers, a victim of the campaign told Huntress.

NexShield was formerly available in the Chrome Web Store and was falsely claimed to be created by Raymond Hill, the developer of the legitimate uBlock Origin ad blocker.

The extension includes ad blocking functionality by cloning the open-source uBlock Origin Lite but adds malicious functionality to crash the victim’s browser and kick off the CrashFix attack.

Social engineering through br…

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help