PULSE NAME
59 Victims, Zero Authentication: A ClickFix Campaign Force-Installs a Chrome Extension Banking Stealer and Leaves the Entire C2 Wide Open
WHITE ANTONIO EDUARDO FREDERICO AlienVault 2026-04-14 Modified: 2026-04-14
19
IOCs
MEDIUM VOLUME
A Brazilian banking fraud operation leveraging ClickFix social engineering was discovered through a community tip, exposing a completely unauthenticated command-and-control infrastructure. The campaign deploys a malicious Chrome extension masquerading as a Banco Central do Brasil tool, force-installed via Chrome Cloud Management enrollment tokens. The extension achieves zero antivirus detections while targeting eight Brazilian financial institutions. At investigation time, 59 machines were compromised with seven active connections. The operator's C2 server exposed all endpoints without authentication, including admin panels, live victim screenshots, stolen credentials in cleartext, and intercepted Pix payment data. Attribution was established through WHOIS records revealing the operator's real name, CPF, and email address. The operation specifically targeted Northern Brazilian regional banks and credit cooperatives, with evidence of compromising a school fund account.
Indicators of Compromise (2 / 19 total)
All IPv4 FileHash-MD5 FileHash-SHA1 FileHash-SHA256 URL domain hostname
TYPEINDICATORDESCRIPTIONCREATED
FileHash-SHA256 401c125517b1f845289bf0a7a33e5db0391034f631eab85dd65b76b7fec9a959 2026-04-14
FileHash-SHA256 b68eefb10e2c304681532bc0c812c7905888e6b8e47448f1e4bc1edfe7ac193d 2026-04-14