From ClickFix deception to information stealer deployment

The article describes a surge in ClickFix campaigns using GHOSTPULSE to deploy Remote Access Trojans and data-stealing malware. It analyzes a multi-stage attack that begins with ClickFix social engineering, deploys GHOSTPULSE loader, and ultimately delivers ARECHCLIENT2, a potent remote access trojan and infostealer. The campaign exploits user psychology, bypasses traditional defenses, and has seen increased activity in 2025. The analysis covers the infection chain, technical details of GHOSTPULSE and ARECHCLIENT2, and the associated infrastructure. The attack targets a wide range of sensitive user data and system information, including cryptocurrency wallets, browser data, and system details. Author: AlienVault

Related Tags:
EDDIESTEALER

clickfix

multi-stage attack

T1566.002

T1204.001

remote access trojan

T1059.001

T1574.002

T1539

Associated Indicators:
4DC5BA5014628AD0C85F6E8903DE4DD3B49FED65796978988DF8C128BA7E7DE9

2EC47CBE6D03E6BDCCCC63C936D1C8310C261755AE5485295FECAC4836D7E56A

F92B491D63BB77ED3B4C7741C8C15BDB7C44409F1F850C08DCE170F5C8712D55

515AF087591021580B0C6131CFBC21E2A98153E2

88CBE81096581D6EC1A060853A250C9A08D710B4

82CDDF3A9BFF315D8FC708E5F5F85F20

DEB5BD989C9FDD5FE7F78F00A1216EB0

2D4FDBA00B7F7B02408A8EA6C199037E

koonenmagaziner.click