Advertisement ยท 728 ร— 90
#
Hashtag
#KongTuke
Advertisement ยท 728 ร— 90
KongTuke ClickFix Campaign

~Trendmicro~
KongTuke abuses compromised WordPress sites with fake CAPTCHA lures to deliver modeloRAT via PowerShell.
-
IOCs: 45. 61. 138. 224, 158. 247. 252. 178, foodgefy. com
-
#KongTuke #ThreatIntel #modeloRAT

0 0 0 0

#Kongtuke
hxxps://sismebtp/.com/6d4f.js

0 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2026-01-23

IOCs:
hxxps://jaskolkki[.]com/7h9v[.]js
confirm[@]195[.]85[.]114[.]118:79
hxxp://195[.]85[.]114[.]118/b

0 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2026-01-22

IOCs:
hxxps://deeesik[.]com/5a6n[.]js
confirm[@]195[.]85[.]114[.]118:79
hxxp://195[.]85[.]114[.]118/b

0 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2026-01-21

IOCs:
hxxps://winnheiser[.]com/5f3s[.]js
verify[@]149[.]248[.]78[.]114:79
hxxp://149[.]248[.]78[.]114/b

0 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2026-01-20

IOCs:
hxxps://wilknnson[.]com/6j6s[.]js
confirm[@]45[.]61[.]138[.]224:79
hxxp://45[.]61[.]138[.]224/b

0 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2026-01-16

IOCs:
hxxps://oconneln[.]com/6b5f[.]js
confirm[@]199[.]217[.]98[.]108:79
hxxp://199[.]217[.]98[.]108/b

0 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2026-01-14

IOCs:
hxxps://bechtellr[.]com/6o9p[.]js
confirm[@]69[.]67[.]173[.]30:79
hxxp://69[.]67[.]173[.]30/b

0 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2026-01-13

IOCs:
hxxps://remaxbemidji[.]com/6h7s[.]js
confirm[@]144[.]31[.]221[.]197:79
hxxp://144[.]31[.]221[.]197/b

0 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2026-01-12

IOCs:
hxxps://leprixnet[.]com/3s5f[.]js
hxxp://144[.]31[.]221[.]132/a
hxxp://144[.]31[.]221[.]132/b

0 0 0 0
Fake "Verify You Are Human" CAPTCHA page that can appear when viewing a page from a legitimate but compromised website.

Fake "Verify You Are Human" CAPTCHA page that can appear when viewing a page from a legitimate but compromised website.

Text from KongTuke's fake CAPTCHA page injected into the viewer's clipboard, and the CAPTCHA page contains instructions to run the text as a command in Window's Run window.

Text from KongTuke's fake CAPTCHA page injected into the viewer's clipboard, and the CAPTCHA page contains instructions to run the text as a command in Window's Run window.

Traffic from the KongTuke activity and resulting infection filtered in Wireshark.

Traffic from the KongTuke activity and resulting infection filtered in Wireshark.

Reposted with correct malware names:

2026-02-02 (Monday) #KongTuke #ClickFix activity leads to #MintsLoader and #GhostWeaver RAT

Today's ClickFix uses the "finger" command, a tactic seen in previous ClickFix activity.

Further details available at www.malware-traffic-analysis.net/2026/02/02/i...

6 3 1 0

#kongtuke
Hxxp://jenmartini/.com/6b7n.js

0 0 0 0

#kongtuke
Hxxps://reberts/.com/6h3d.js
Hxxps://reberts/.com/js.php

0 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2026-01-08

IOCs:
hxxps://frttsch[.]com/2w2w[.]js
hxxp://144[.]31[.]221[.]60/a
hxxp://144[.]31[.]221[.]60/b

1 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2025-12-29

IOCs:
hxxps://metavrze[.]com/5h5h[.]js
hxxp://144[.]31[.]221[.]150/a
hxxp://144[.]31[.]221[.]150/b

0 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2025-12-23

IOCs:
hxxps://emierich[.]com/2o2o[.]js
hxxp://payload[.]bruemald[.]top

0 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2025-12-19

IOCs:
hxxps://csmultimedia[.]com/5k5k[.]js
hxxp://64[.]95[.]12[.]232/a
hxxp://64[.]95[.]12[.]232/b

0 0 0 0
Preview
ClickFix to CrashFix: KongTuke Used Fake Chrome Ad Blocker to Install ModeloRAT Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

๐Ÿ“ฃ ๐Ÿšจ #KongTuke hacker group cloned a #Chrome ad blocker to trick users into installing spyware which also launched DoS attacks, crashed browsers, and dropped ModeloRAT.

Read: hackread.com/clickfix-cra...

#CyberSecurity #Malware #ModeloRAT #ClickFix #CrashFix

0 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2025-12-18

IOCs:
hxxps://mckeczie[.]com/4h4h[.]js
gcaptcha[@]areuhuman[.]top:79
hxxp://k07hf6dakz44rdp[.]com

0 0 0 0

#kongtuke
Hxxps://remaxbemidji/.com/6h7s.js

0 0 0 0
Fake CAPTCHA window and ClickFix script after visiting legitimate, but compromised website.

Fake CAPTCHA window and ClickFix script after visiting legitimate, but compromised website.

Traffic from the infection filtered in Wireshark (part 1 of 2).

Traffic from the infection filtered in Wireshark (part 1 of 2).

Traffic from the infection filtered in Wireshark (part 2 of 2).

Traffic from the infection filtered in Wireshark (part 2 of 2).

Screenshot from the start of the page for this blog post.

Screenshot from the start of the page for this blog post.

2026-01-08 (Thursday): Got a full infection from #KongTuke campaign #ClickFix activity today. Traffic from the infection in two #pcap files, the associated malware, artifacts, and further information is available at www.malware-traffic-analysis.net/2026/01/08/i...

3 0 0 0
Injected KongTuke script in page from compromised website.

Injected KongTuke script in page from compromised website.

Fake CAPTCHA page from KongTuke domain, scrroeder[.]com.

Fake CAPTCHA page from KongTuke domain, scrroeder[.]com.

KongTuke's "ClickFix" command injected into the viewer's clipboard.

KongTuke's "ClickFix" command injected into the viewer's clipboard.

Traffic from the activity filtered in Wireshark. I did not get the malware from this.

Traffic from the activity filtered in Wireshark. I did not get the malware from this.

2026-01-05 (Monday): #KongTuke domain scrroeder[.]com generated #ClickFix script for 144.31.221[.]71, but I didn't get a malware infection when I tried it today.

7 1 0 0

#kongtuke
Hxxps://emierich/.com2o2o.js

0 0 0 0
Screenshot of the post with the pcaps, files, and other info from the Kongtuke ClickFix activity using the finger command on 2025-12-11.

Screenshot of the post with the pcaps, files, and other info from the Kongtuke ClickFix activity using the finger command on 2025-12-11.

I finished compiling the information for #Kongtuke #ClickFix activity using the finger command on 2025-12-11, and it's now live at www.malware-traffic-analysis.net/2025/12/11/i...

I'd already posted the #SmartApeSG ClickFix activity using finger that same day, so now both are available.

4 1 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2025-12-17

IOCs:
hxxps://leprixnet[.]com/3s3s[.]js
hxxp://193[.]149[.]187[.]146/a

0 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2025-12-16

IOCs:
hxxps://ibuyline[.]com/2d2d[.]js
hxxp://193[.]149[.]190[.]117/a

0 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2025-12-15

IOCs:
hxxps://fsglobe[.]com/1e1e[.]js
hxxp://193[.]149[.]190[.]117/a

0 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2025-12-12

IOCs:
hxxps://gozamba[.]com/2q2q[.]js
gcaptcha[@]checkhuman[.]top:79

0 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2025-12-11

IOCs:
hxxps://wwexp[.]com/1w1w[.]js
gcaptcha[@]captchaver[.]top:79

0 0 0 0

Compromised website > #KongTuke > #ClickFix:

Date Observed: 2025-12-10

IOCs:
hxxps://vimsltd[.]com/9o9o[.]js
cloudflare[@]cfcheckver[.]top:79

0 0 0 0