MostereRAT and ClickFix: Rising AI and Phishing Threats

MostereRAT and ClickFix: Rising AI and Phishing Threats

In the ever-evolving world of cybersecurity, staying ahead of sophisticated threats like MostereRAT and ClickFix requires deep expertise and innovative strategies. Today, we’re thrilled to speak with Malik Haidar, a seasoned cybersecurity expert with years of experience protecting multinational corporations from hackers and advanced threats. With a unique blend of analytics, intelligence, and a business-focused approach to security, Malik offers invaluable insights into the latest malware campaigns and phishing tactics that are challenging organizations worldwide. In this interview, we’ll explore the intricacies of emerging threats, the cunning methods attackers use to bypass defenses, and the steps businesses can take to safeguard their systems and data.

Can you start by shedding light on what MostereRAT is and why it poses such a significant threat to cybersecurity?

MostereRAT is a particularly nasty piece of malware that started as a banking trojan but has evolved into a full-blown remote access trojan, or RAT. What makes it so dangerous is its ability to take complete control over a compromised system, steal sensitive data, and even deploy additional tools or plugins to expand its reach. It uses advanced evasion tactics, like disabling security features and hiding its malicious activities, which makes it incredibly hard to detect and stop. Unlike many other threats, it’s not just about stealing data—it’s about owning the system entirely, which can lead to devastating consequences for businesses and individuals alike.

What sets MostereRAT apart from other malware or remote access trojans you’ve encountered in your career?

One of the standout features of MostereRAT is its sophistication in evasion. It doesn’t just rely on traditional obfuscation; it actively interferes with security tools by blocking their network traffic and disabling critical defenses. It also runs with high-level privileges by impersonating TrustedInstaller, a Windows system account, which gives it the power to manipulate core processes and files. This level of access and persistence is rare and makes it a cut above many other RATs I’ve seen, which often lack this depth of system control.

The use of Easy Programming Language, or EPL, in MostereRAT is quite unusual. Can you explain what EPL is and why attackers might have chosen it?

EPL, or Easy Programming Language, is a lesser-known visual programming language that supports multiple languages, including Japanese and Chinese variants. It’s designed to be accessible to users who might not be fluent in English, which could be one reason attackers opted for it—potentially to blend in with certain target demographics or developer communities. Another reason might be that its obscurity helps it fly under the radar. Since it’s not widely used, many security tools aren’t specifically tuned to detect scripts or payloads written in EPL, giving attackers a slight edge in evading detection.

MostereRAT often targets Japanese users through phishing emails disguised as business inquiries. Why do you think attackers zero in on specific groups or regions like this?

Attackers often target specific groups or regions because they’ve done their homework and identified vulnerabilities or high-value opportunities. In the case of Japanese users, it could be tied to the country’s strong business culture and reliance on formal communication, which makes phishing emails about business inquiries more believable. Additionally, certain regions or industries might have less stringent cybersecurity measures or awareness, making them easier targets. It’s a calculated move—attackers go where they think they’ll get the most return, whether that’s financial data, intellectual property, or system access.

Can you walk us through how MostereRAT typically infiltrates a system, especially via a Microsoft Word file?

Sure. The infection often starts with a phishing email that tricks the user into clicking a malicious link, which leads to downloading a booby-trapped Microsoft Word document. Inside that document is usually a ZIP archive containing an executable file. Once the user opens or extracts it, the executable kicks off the installation of MostereRAT. From there, it deploys additional tools like AnyDesk or TigerVNC for remote access, using modules often written in EPL. It’s a multi-stage process designed to bypass initial defenses and establish a foothold before the user or security software even realizes what’s happened.

One alarming feature of MostereRAT is its ability to disable Windows security mechanisms. How does it manage to do that without being detected?

MostereRAT is incredibly crafty in this regard. It uses techniques similar to some red team tools, like blocking network traffic related to security programs through Windows Filtering Platform filters. This prevents those programs from connecting to their servers or sending out alerts and telemetry data. By running as TrustedInstaller, it gains elevated privileges that let it tamper with critical system components, modify registry entries, and even delete files that might flag its presence. These tactics make it a silent operator, often evading detection until significant damage is done.

The malware also seems to target very specific tools, like Qianniu, which is Alibaba’s Seller Tool. What might attackers be after with such a narrow focus?

Targeting something as specific as Qianniu suggests that attackers are likely after sensitive business data, such as transaction details, customer information, or login credentials tied to e-commerce activities. These tools are often used by sellers who manage significant financial operations, so compromising them could yield a goldmine of data for fraud or resale on the dark web. This kind of focus also indicates that the malware is tailored for particular industries or business types, showing how attackers are becoming more strategic in their approach.

Shifting gears, let’s discuss ClickFix techniques. Can you explain what these are and how they manipulate users into falling for the trap?

ClickFix techniques are a form of social engineering that trick users into performing actions that seem helpful or necessary but actually lead to malware infection. For example, in some campaigns, users searching for software like AnyDesk are directed to fake verification pages that prompt them to click checkboxes or open specific Windows tools like File Explorer. These actions trigger hidden scripts or shortcuts that install malware like MetaStealer. The genius—and danger—of ClickFix is that it exploits user trust and curiosity, making them active participants in their own compromise while often bypassing traditional security solutions.

With the rise of AI and tactics like prompt overdose in ClickFix campaigns, how are attackers leveraging technology to enhance their social engineering efforts?

Attackers are getting creative with AI by using techniques like prompt overdose, where they flood an AI model’s input with malicious content to manipulate its output. For instance, they embed harmful instructions in HTML content so that when an AI tool—like those in email clients or browser extensions—summarizes it, the output includes step-by-step guidance for the user to follow, often leading to ransomware or other malware. This preys on the trust people have in AI-generated content, making it a powerful tool for deception. It’s a stark reminder that as technology advances, so do the ways attackers can exploit it.

Looking ahead, what is your forecast for the evolution of phishing and malware campaigns like MostereRAT and ClickFix in the coming years?

I expect these threats to become even more sophisticated and personalized. Attackers will likely lean harder into AI and machine learning to craft hyper-targeted phishing emails or social engineering lures that are nearly indistinguishable from legitimate communications. We’ll also see malware like MostereRAT evolve to exploit emerging technologies or platforms, finding new ways to bypass security tools through obscure languages or system-level tricks. On the defensive side, it’s going to be a race to build smarter, adaptive solutions and educate users, because human error will remain a key entry point for these attacks. The battlefield is only going to get more complex.

subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address