Close Menu
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
What's Hot

Spiraling with ChatGPT | TechCrunch

June 15, 2025

Taiwan places export controls on Huawei and SMIC

June 15, 2025

New Spy×Family Musical Announces Anya Forger Actresses – News

June 15, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
Home » MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks
Cybersecurity

MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks

HarishBy HarishMay 2, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
Share
Facebook Twitter Pinterest Reddit WhatsApp Email


May 02, 2025Ravie LakshmananMalware / Threat Intelligence

MintsLoader Drops GhostWeaver via Phishing, ClickFix

The malware loader known as MintsLoader has been used to deliver a PowerShell-based remote access trojan called GhostWeaver.

“MintsLoader operates through a multi-stage infection chain involving obfuscated JavaScript and PowerShell scripts,” Recorded Future’s Insikt Group said in a report shared with The Hacker News.

“The malware employs sandbox and virtual machine evasion techniques, a domain generation algorithm (DGA), and HTTP-based command-and-control (C2) communications.”

Phishing and drive-by download campaigns distributing MintsLoader have been detected in the wild since early 2023, per Orange Cyberdefense. The loader has been observed delivering various follow-on payloads like StealC and a modified version of the Berkeley Open Infrastructure for Network Computing (BOINC) client.

Cybersecurity

The malware has also been put to use by threat actors operating e-crime services like SocGholish (aka FakeUpdates) and LandUpdate808 (aka TAG-124), distributing via phishing emails targeting the industrial, legal, and energy sectors and fake browser update prompts.

MintsLoader Drops GhostWeaver via Phishing, ClickFix

In a notable twist, recent attack waves have employed the increasingly prevalent social engineering tactic called ClickFix to trick site visitors into copying and executing malicious JavaScript and PowerShell code. The links to ClickFix pages are distributed via spam emails.

“Although MintsLoader functions solely as a loader without supplementary capabilities, its primary strengths lie in its sandbox and virtual machine evasion techniques and a DGA implementation that derives the C2 domain based on the day it is run,” Recorded Future said.

Uses DGA, TLS for Stealth Attacks

These features, coupled with obfuscation techniques, enable threat actors to hinder analysis and complicate detection efforts. The primary responsibility of the malware is to download the next-stage payload from a DGA domain over HTTP by means of a PowerShell script.

GhostWeaver, according to a report from TRAC Labs earlier this February, is designed to maintain persistent communication with its C2 server, generate DGA domains based on a fixed-seed algorithm based on the week number and year, and deliver additional payloads in the form of plugins that can steal browser data and manipulate HTML content.

Cybersecurity

“Notably, GhostWeaver can deploy MintsLoader as an additional payload via its sendPlugin command. Communication between GhostWeaver and its command-and-control (C2) server is secured through TLS encryption using an obfuscated, self-signed X.509 certificate embedded directly within the PowerShell script, which is leveraged for client-side authentication to the C2 infrastructure,” Recorded Future said.

The disclosure comes as Kroll revealed attempts made by threat actors to secure initial access through an ongoing campaign codenamed CLEARFAKE that leverages ClickFix to lure victims into running MSHTA commands that ultimately deploy the Lumma Stealer malware.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



Source link

Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
Previous ArticleSean ‘Diddy’ Combs trial witnesses (Exclusive)
Next Article Stablecoins: Depegging, fraudsters and decentralization
Harish
  • Website
  • X (Twitter)

Related Posts

Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

June 14, 2025

Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month

June 13, 2025

Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion

June 13, 2025

Shifting from Monitoring Alerts to Measuring Risk

June 13, 2025

Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware

June 13, 2025

How VexTrio and Affiliates Run a Global Scam Network

June 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Our Picks

Spiraling with ChatGPT | TechCrunch

June 15, 2025

Taiwan places export controls on Huawei and SMIC

June 15, 2025

New Spy×Family Musical Announces Anya Forger Actresses – News

June 15, 2025

Seth Rogen, Adam Brody, John Mulaney & THR’s Comedy Actors Roundtable

June 15, 2025
Don't Miss
Blockchain

Deep liquidity issue is crypto’s silent structural risk

June 15, 20255 Mins Read

Opinion by: Arthur Azizov, Founder and Investor at B2 VenturesDespite its decentralized nature and big…

Is it the future of finance?

June 14, 2025

Trump Reports $57M Crypto Income From WLFI Venture

June 14, 2025

Former Blockchain Exec Joins SEC As Director Of Trading And Markets

June 13, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Luminari, your go-to hub for mastering modern tech and staying ahead in the digital world.

At Luminari, we’re passionate about breaking down complex technologies and delivering insights that matter. Whether you’re a developer, tech enthusiast, job seeker, or lifelong learner, our mission is to equip you with the tools and knowledge you need to thrive in today’s fast-moving tech landscape.

Our Picks

Spiraling with ChatGPT | TechCrunch

June 15, 2025

Taiwan places export controls on Huawei and SMIC

June 15, 2025

Google reportedly plans to cut ties with Scale AI

June 14, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 luminari. Designed by luminari.

Type above and press Enter to search. Press Esc to cancel.