Article Details
Scrape Timestamp (UTC): 2025-12-30 21:16:07.097
Original Article Text
Click to Toggle View
New ErrTraffic service enables ClickFix attacks via fake browser glitches. A new cybercrime tool called ErrTraffic allows threat actors to automate ClickFix attacks by generating 'fake glitches' on compromised websites to lure users into downloading payloads or following malicious instructions. The platform promises conversion rates as high as 60% and can determine the target system to deliver compatible payloads. ClickFix is a social engineering technique where targets are tricked into executing dangerous commands on their systems under believable pretenses, such as fixing technical problems or validating their identity. It has grown in popularity since 2024, especially this year, as both cybercriminals and state-sponsored actors have adopted it for its effectiveness in bypassing standard security controls. Automating ClickFix ErrTraffic is a new cybercrime platform first promoted on Russian-speaking hacking forums earlier this month by someone using the alias LenAI. It functions as a self-hosted traffic distribution system (TDS) that deploys ClickFix lures and is sold to customers for a one-time purchase of $800. Hudson Rock researchers who analyzed the platform report that it offers a user-friendly panel that provides various configuration options and access to real-time campaign data. The attacker must already control a website that accepts victim traffic, or has injected malicious code into a legitimate, compromised website, and then add ErrTraffic to it via an HTML line. The site’s behavior remains the same for regular visitors who do not match the targeting criteria, but when geolocation and OS fingerprinting conditions are met, the page’s DOM is modified to display a visual glitch. The issues may include corrupted or illegible text, font replacement with symbols, fake Chrome updates, or missing system font errors. This makes the page appear "broken" and creates the condition to provide the victim a 'solution' in the form of installing a browser update, downloading a system font, or pasting something in the command prompt. If the victim follows the instructions, a PowerShell command is added to the clipboard by means of JavaScript code. Executing the command leads to downloading a payload. Hudson Rock explicitly specifies that the payloads are Lumma and Vidar info-stealers on Windows, Cerberus trojan on Android, AMOS (Atomic Stealer) on macOS, and unspecified Linux backdoors. ErrTraffic clients can define the payload for each targeted architecture and specify the countries that qualify for infection. However, there’s a hardcoded exclusion for CIS (Commonwealth of Independent States) countries, which may indicate the origin of ErrTraffic's developer. Hudson Rock, which monitors the entire credential-theft lifecycle, reports that, in most cases, the harvested data is sold on darknet markets or leveraged to compromise more websites and inject the ErrTraffic script again. Break down IAM silos like Bitpanda, KnowBe4, and PathAI Broken IAM isn't just an IT problem - the impact ripples across your whole business. This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.
Daily Brief Summary
ErrTraffic is a new cybercrime tool enabling automated ClickFix attacks by simulating browser glitches to deceive users into executing harmful commands.
Promoted on Russian-speaking forums, ErrTraffic is sold for $800, appealing to cybercriminals with its high conversion rates and user-friendly interface.
Attackers must control or compromise a website to deploy ErrTraffic, which uses geolocation and OS fingerprinting to target specific users.
The tool modifies a webpage’s DOM to display issues like fake Chrome updates or corrupted text, prompting victims to download malware-laden "solutions."
Payloads delivered via ErrTraffic include Lumma and Vidar info-stealers on Windows, Cerberus trojan on Android, and AMOS on macOS.
ErrTraffic excludes CIS countries from targeting, suggesting a possible origin linked to its developer's location.
Harvested data is often sold on darknet markets or used to further propagate ErrTraffic, expanding its reach and impact.