← Back to Pulse Feed
PULSE DETAIL
PULSE NAME
59 Victims, Zero Authentication: A ClickFix Campaign Force-Installs a Chrome Extension Banking Stealer and Leaves the Entire C2 Wide Open
A Brazilian banking fraud operation leveraging ClickFix social engineering was discovered through a community tip, exposing a completely unauthenticated command-and-control infrastructure. The campaign deploys a malicious Chrome extension masquerading as a Banco Central do Brasil tool, force-installed via Chrome Cloud Management enrollment tokens. The extension achieves zero antivirus detections while targeting eight Brazilian financial institutions. At investigation time, 59 machines were compromised with seven active connections. The operator's C2 server exposed all endpoints without authentication, including admin panels, live victim screenshots, stolen credentials in cleartext, and intercepted Pix payment data. Attribution was established through WHOIS records revealing the operator's real name, CPF, and email address. The operation specifically targeted Northern Brazilian regional banks and credit cooperatives, with evidence of compromising a school fund account.
MITRE ATT&CK & Malware Families
Indicators of Compromise (9 / 19 total)
| TYPE | INDICATOR | DESCRIPTION | CREATED | |
|---|---|---|---|---|
| URL | http://144.126.140.33:3000 | — | 2026-04-14 | |
| URL | http://144.126.140.33:3000/admin | — | 2026-04-14 | |
| URL | http://144.126.140.33:3000/api/users | — | 2026-04-14 | |
| URL | http://144.126.140.33:3000/openapi.json | — | 2026-04-14 | |
| URL | http://144.126.140.33:5000 | — | 2026-04-14 | |
| URL | http://protocolovirtual.org | — | 2026-04-14 | |
| URL | http://test1.amanur.com | — | 2026-04-14 | |
| URL | http://xpie348.online/instalador/get_token.ps1 | — | 2026-04-14 | |
| URL | http://xpie348.online/instalador/update.xml | — | 2026-04-14 |