• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

MintsLoader Drops GhostWeaver by way of Phishing, ClickFix — Makes use of DGA, TLS for Stealth Assaults

Admin by Admin
May 2, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Could 02, 2025Ravie LakshmananMalware / Risk Intelligence

MintsLoader Drops GhostWeaver via Phishing, ClickFix

The malware loader referred to as MintsLoader has been used to ship a PowerShell-based distant entry trojan known as GhostWeaver.

“MintsLoader operates by a multi-stage an infection chain involving obfuscated JavaScript and PowerShell scripts,” Recorded Future’s Insikt Group stated in a report shared with The Hacker Information.

“The malware employs sandbox and digital machine evasion strategies, a website era algorithm (DGA), and HTTP-based command-and-control (C2) communications.”

Phishing and drive-by obtain campaigns distributing MintsLoader have been detected within the wild since early 2023, per Orange Cyberdefense. The loader has been noticed delivering numerous follow-on payloads like StealC and a modified model of the Berkeley Open Infrastructure for Community Computing (BOINC) consumer.

Cybersecurity

The malware has additionally been put to make use of by menace actors working e-crime providers like SocGholish (aka FakeUpdates) and LandUpdate808 (aka TAG-124), distributing by way of phishing emails focusing on the commercial, authorized, and power sectors and pretend browser replace prompts.

MintsLoader Drops GhostWeaver via Phishing, ClickFix

In a notable twist, current assault waves have employed the more and more prevalent social engineering tactic known as ClickFix to trick web site guests into copying and executing malicious JavaScript and PowerShell code. The hyperlinks to ClickFix pages are distributed by way of spam emails.

“Though MintsLoader features solely as a loader with out supplementary capabilities, its main strengths lie in its sandbox and digital machine evasion strategies and a DGA implementation that derives the C2 area primarily based on the day it’s run,” Recorded Future stated.

Uses DGA, TLS for Stealth Attacks

These options, coupled with obfuscation strategies, allow menace actors to hinder evaluation and complicate detection efforts. The first duty of the malware is to obtain the next-stage payload from a DGA area over HTTP via a PowerShell script.

GhostWeaver, in response to a report from TRAC Labs earlier this February, is designed to keep up persistent communication with its C2 server, generate DGA domains primarily based on a fixed-seed algorithm primarily based on the week quantity and yr, and ship further payloads within the type of plugins that may steal browser knowledge and manipulate HTML content material.

Cybersecurity

“Notably, GhostWeaver can deploy MintsLoader as a further payload by way of its sendPlugin command. Communication between GhostWeaver and its command-and-control (C2) server is secured by TLS encryption utilizing an obfuscated, self-signed X.509 certificates embedded immediately inside the PowerShell script, which is leveraged for client-side authentication to the C2 infrastructure,” Recorded Future stated.

The disclosure comes as Kroll revealed makes an attempt made by menace actors to safe preliminary entry by an ongoing marketing campaign codenamed CLEARFAKE that leverages ClickFix to lure victims into working MSHTA instructions that in the end deploy the Lumma Stealer malware.

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.



Tags: AttacksClickFixDGADropsGhostWeaverMintsLoaderPhishingStealthTLS
Admin

Admin

Next Post
6 Confirmed Steps to Grasp Ecommerce Key phrase Analysis

6 Confirmed Steps to Grasp Ecommerce Key phrase Analysis

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

How Can We Recuperate A 30% Drop In Natural Site visitors From A Web site Migration?

How Can We Recuperate A 30% Drop In Natural Site visitors From A Web site Migration?

July 29, 2025
Nanbeige4-3B-Pondering: How a 23T Token Pipeline Pushes 3B Fashions Previous 30B Class Reasoning

Nanbeige4-3B-Pondering: How a 23T Token Pipeline Pushes 3B Fashions Previous 30B Class Reasoning

December 13, 2025

Trending.

AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

February 23, 2026
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
10 tricks to begin getting ready! • Yoast

10 tricks to begin getting ready! • Yoast

July 21, 2025
Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

March 16, 2026
Introducing Sophos Endpoint for Legacy Platforms – Sophos Information

Introducing Sophos Endpoint for Legacy Platforms – Sophos Information

August 28, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

FBI Warns Russian Hackers Goal Sign, WhatsApp in Mass Phishing Assaults

FBI Warns Russian Hackers Goal Sign, WhatsApp in Mass Phishing Assaults

March 21, 2026
16 Ecommerce Product Web page Examples + Finest Practices

16 Ecommerce Product Web page Examples + Finest Practices

March 21, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved