Close Menu
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
What's Hot

Alcoa Nears Sale of New York Smelter Site to NYDIG: Bloomberg

April 17, 2026

Why JPMorgan says the U.S. crypto rulebook is ‘close to completion’

April 17, 2026

Flare Proposes MEV Capture and 40% Inflation Cut Ahead of Vote

April 17, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
CryptoPulseDaily.com
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
CryptoPulseDaily.com
Home»Security and Privacy»FileFix Campaign Using Steganography and Multistage Payloads
FileFix Campaign Using Steganography and Multistage Payloads
Security and Privacy

FileFix Campaign Using Steganography and Multistage Payloads

September 17, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

A rare in-the-wild FileFix campaign has been observed by cybersecurity researchers, which hides a second-stage PowerShell script and encrypted executables inside JPG images.

The attack, detailed in an advisory by Acronis, persuades victims to paste a malicious command into a file upload address bar, then runs a heavily obfuscated PowerShell chain that downloads and parses images to extract payloads.

What’s new in this instance is that the campaign departs from the original attack proof of concept (POC). ClickFix-style attacks have surged recently by over 500% and a FileFix proof of concept was published in early July by researcher Mr. d0x.

This particular deployment, however, is the first seen in the wild that does not strictly follow that POC and instead uses multilingual phishing pages, heavy JavaScript minification and steganography to conceal code.

Phishing Infrastructure and Social Engineering

According to Acronis, the phishing site mimics a Meta support page and pressures users into an appeal flow that asks them to “open File Explorer” and paste a path that is actually a payload.

The site includes translations for 16 languages and multiple variants have been active in the last two weeks, indicating rapid iteration and global targeting.

The social engineering element of FileFix may prove more persuasive than ClickFix, as most users are familiar with file upload windows, but not with terminal prompts. This subtle shift demonstrates how attackers are refining lures to align with everyday user behavior.

Read more on steganography: Threat Actors Target Victims with HijackLoader and DeerStealer

Multistage Delivery and Final Payload

The attack infection chain begins with an obfuscated PowerShell one-liner that reconstructs variables, downloads an image hosted on BitBucket and extracts a plaintext second-stage script from a defined byte range. 

See also  Crypto-Stealing Campaign Deploys MortalKombat Ransomware

That script uses RC4 decryption and gzip decompression to carve multiple files from the image, execute EXEs via conhost.exe and then remove them.

The final loader, written in Go, carries out sandbox checks by comparing hardware information, then decrypts shellcode leading to the deployment of StealC. 

This infostealer is capable of harvesting data from browsers, cryptocurrency wallets, messaging apps and cloud services. Researchers note that StealC can also act as a downloader, giving attackers flexibility to deliver additional malware.

Detection and Mitigation

Key recommendations from Acronis researchers center on strengthening both user training and technical defenses.

Organizations are encouraged to take a layered approach that combines awareness with proactive blocking measures, including:

  • Teach users to avoid pasting commands into system dialogs or file upload address bars

  • Block PowerShell, CMD, MSIEXEC or MSHTA processes launched from web browsers

  • Monitor for unusual browser-child process activity across endpoints

The campaign highlights how quickly FileFix has evolved from a proof of concept to an active threat.

By blending social engineering, obfuscation and steganography, attackers are making detection more difficult. Security teams must stay alert and ensure users understand these emerging *Fix attack techniques.

Source link

campaign FileFix MultiStage Payloads Steganography
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Cookeville Hospital Discloses Rhysida Breach Hitting 337,917

April 16, 2026

Marks & Spencer Introduces its new ‘Love That’ campaign – Inspired by the power of a simple compliment

April 16, 2026

Kraken is actively being extorted by criminals threatening to release the top crypto exchange’s internal data

April 14, 2026

Operation Atlantic Seizes $12m in Crypto Losses

April 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

UPbit becomes third major crypto firm to secure licensing in Singapore this October

October 18, 2023

EMC Protocol Integrates with Nuco.cloud for New Opportunities in AI

April 15, 2024

XRP posts 70% gains: Can the rally continue?

July 14, 2023

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

Our mission is to develop a community of people who try to make financially sound decisions. The website strives to educate individuals in making wise choices about Crypto, ICOs, Web3, Blockchain and more.

We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Alcoa Nears Sale of New York Smelter Site to NYDIG: Bloomberg

April 17, 2026

Why JPMorgan says the U.S. crypto rulebook is ‘close to completion’

April 17, 2026

Flare Proposes MEV Capture and 40% Inflation Cut Ahead of Vote

April 17, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 Crypto Pulse Daily - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.

Cleantalk Pixel
  • bitcoinBitcoin(BTC)$77,302.003.44%
  • ethereumEthereum(ETH)$2,423.453.87%
  • tetherTether(USDT)$1.000.01%
  • rippleXRP(XRP)$1.482.98%
  • binancecoinBNB(BNB)$646.862.39%
  • usd-coinUSDC(USDC)$1.000.01%
  • solanaSolana(SOL)$89.100.79%
  • tronTRON(TRX)$0.3271230.18%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.02-1.21%
  • dogecoinDogecoin(DOGE)$0.0994240.75%