Venom Stealer MaaS Platform Commoditizes ClickFix Attacks

Venom Stealer MaaS Platform Commoditizes ClickFix Attacks

Summary

Researchers at BlackFog have identified a new malware-as-a-service (MaaS) platform called Venom Stealer that automates ClickFix-style social engineering attacks and extends them into a continuous, post-compromise data-exfiltration pipeline. Marketed on cybercriminal forums, the platform offers subscription access, operator tooling, multi-platform templates and templates that trick users into self-executing payloads via fake CAPTCHAs, OS updates and other prompts.

Venom Stealer ships native C++ payloads compiled per-operator and supports Windows and macOS templates. Once executed, it persistently harvests saved passwords, cookies, autofill data, browser history, extension inventories and multiple cryptocurrency wallet types. Extracted wallet data is sent to a server-side GPU cracking engine; newer updates add file/seed searching to widen the attack surface. The platform also includes evasion techniques that can bypass Chrome encryption and avoid UAC prompts, making detection and forensics harder.

Key Points

  • Venom Stealer is a MaaS that packages ClickFix social engineering into an operator panel, automating the entire attack lifecycle from initial trick page to continuous data theft.
  • The service is sold by subscription (reported $250/month or $1,800 lifetime) and includes operator vetting, Telegram licensing and affiliate options.
  • Attack templates for Windows and macOS use fake CAPTCHA, update prompts and other lures that ask users to paste and run commands, making execution appear user-initiated and bypassing some process-based defences.
  • Payload types include native .exe binaries, fileless PowerShell, .hta, .bat on Windows and bash/curl on macOS; payloads scan Chromium- and Firefox-based profiles for credentials, cookies, wallets and more.
  • Venom continuously monitors systems after the first compromise, capturing newly saved credentials in real time and undermining credential-rotation incident response measures.
  • Extracted wallet data is fed to a GPU cracking pipeline that targets many popular wallets (MetaMask, Phantom, Exodus, Electrum, Bitcoin Core, Monero, Tonkeeper and others).
  • Defensive recommendations include restricting PowerShell, disabling Run for standard users, user training against ClickFix prompts, and tighter monitoring/controls on outbound traffic to spot exfiltration.

Content summary

The Venom Stealer operation automates ClickFix-style attacks end-to-end. Operators get ready-made social-engineering pages and commands to hand victims, payload builders that compile per operator, and a backend pipeline that immediately exfiltrates harvested secrets to cloud servers for cracking and monetisation. Notable technical capabilities include silent privilege escalation to extract Chrome decryption keys without triggering UAC, real-time monitoring of browser login stores to catch newly saved credentials, and tools that search the filesystem for seed phrases and password-protected files.

The result is a persistent compromise that extends far beyond the initial interactive trick: attackers can siphon credentials and crypto assets continuously, and the rapid outbound exfiltration reduces local forensic artefacts. Detection is made harder unless organisations block or inspect outbound connections and limit user actions that enable self-execution of malicious commands.

Context and relevance

ClickFix-style social engineering has been on the rise for a couple of years; Venom Stealer lowers the technical bar by packaging the technique as a commercial service. For security teams, this matters because commoditisation increases attack volume and diversity: less-skilled criminals can now deploy powerful, persistent stealers without building the pipeline themselves. The focus on cryptocurrency wallets and seed-finding also reflects continuing attacker interest in high-value, hard-to-recover assets.

This article is directly relevant to endpoint defenders, SOC teams, incident responders and anyone responsible for user privilege controls or outbound network monitoring. It reinforces common controls (PowerShell restrictions, Group Policy for Run dialog) and highlights where additional telemetry and egress filtering can materially reduce impact.

Why should I read this?

Short version: if you manage endpoints or user security, this is the sort of thing that will kick off a messy, long-running compromise in your estate if it lands. Venom turns a simple “paste this command” trick into a full-time data siphon — and it makes crypto wallets an automated payday. Read it to know what to block, who to warn, and where to add monitoring before someone else tests it on your network.

Source

Source: https://www.darkreading.com/endpoint-security/venom-stealer-maas-commoditizes-clickfix-attacks