FileFix in the wild! New FileFix campaign goes beyond POC and leverages steganography
A sophisticated FileFix attack campaign has been discovered, marking the first use of this technique beyond proof-of-concept. The attack employs a complex phishing infrastructure, including a multilingual site mimicking Facebook security. It uses steganography to conceal malicious code in images, with a multistage payload delivery system featuring layered obfuscation and evasion techniques. The final payload deploys a StealC infostealer targeting various applications and credentials. The campaign has evolved rapidly over two weeks, indicating a global targeting strategy with potential victims in multiple countries. This attack represents a significant advancement in *Fix attack sophistication, combining FileFix with advanced tradecraft to maximize both evasion and impact.
AI Analysis
Technical Summary
The FileFix campaign represents a sophisticated malware attack that has transitioned from proof-of-concept to active exploitation in the wild. This campaign employs a complex phishing infrastructure, including multilingual phishing websites that impersonate Facebook security pages to lure victims. A notable technical advancement in this campaign is the use of steganography to conceal malicious code within images, which helps evade traditional detection mechanisms. The attack utilizes a multistage payload delivery system characterized by layered obfuscation and evasion techniques, making it difficult for security tools to detect and analyze the malware at early stages. The final payload deployed is the StealC infostealer, which targets a broad range of applications and credentials, aiming to exfiltrate sensitive user data such as login credentials, session tokens, and potentially other personal or corporate information. The campaign has evolved rapidly over a short period (two weeks), indicating an agile threat actor employing advanced tradecraft to maximize evasion and impact. Indicators of compromise include multiple file hashes, IP addresses, and domains associated with the phishing infrastructure and malware delivery. The attack techniques align with several MITRE ATT&CK tactics and techniques, including credential dumping (T1003), phishing (T1566.002), obfuscated files or information (T1027), process injection (T1055), and use of steganography (T1001.003). The campaign's global targeting strategy suggests potential victims across multiple countries, with confirmed activity in Germany. The combination of social engineering, advanced obfuscation, and steganography marks a significant evolution in FileFix attack sophistication, posing a serious threat to organizations relying on user vigilance and traditional detection methods.
Potential Impact
For European organizations, the FileFix campaign poses a significant risk to confidentiality and integrity of sensitive information. The use of phishing to gain initial access exploits human factors, which remain a primary vulnerability in many organizations. Once infected, the StealC infostealer can exfiltrate credentials and other sensitive data, potentially leading to further compromise such as unauthorized access to corporate networks, financial fraud, or intellectual property theft. The multistage and obfuscated nature of the payload complicates detection and response efforts, increasing dwell time and potential damage. Given the campaign’s rapid evolution and multilingual phishing sites, organizations across Europe, especially those with employees using Facebook or related services, are at risk. The attack can disrupt business operations by compromising user accounts and potentially enabling lateral movement within networks. Additionally, the use of steganography to hide malicious code in images challenges conventional security controls, requiring more advanced detection capabilities. The campaign’s targeting of credentials also threatens the security of cloud services, email systems, and other critical infrastructure commonly used by European enterprises.
Mitigation Recommendations
1. Enhance phishing detection and user awareness training with a focus on identifying sophisticated phishing sites, especially those impersonating trusted brands like Facebook. 2. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting obfuscated and multistage payloads, including behavioral analysis to identify steganography-based code execution. 3. Implement strict email filtering and URL reputation services to block access to known malicious domains and IPs associated with this campaign (e.g., facebook.meta-software-worldwide.com, facebook.windows-software-updates.com). 4. Enforce multi-factor authentication (MFA) across all user accounts to mitigate the impact of credential theft. 5. Monitor network traffic for unusual outbound connections, especially to the identified IP 77.90.153.225 and suspicious domains. 6. Regularly update and patch all software and systems to reduce attack surface, even though no specific vulnerable versions are listed for this campaign. 7. Use threat intelligence feeds to incorporate the provided hashes and indicators of compromise into detection tools. 8. Conduct regular credential audits and implement least privilege access controls to limit the damage from stolen credentials. 9. Employ steganography detection tools or services to analyze inbound images and attachments for hidden code. 10. Establish incident response plans that include rapid containment and eradication procedures for multistage malware infections.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
Indicators of Compromise
- hash: 3344a2d675911a0136199004cf8ec059
- hash: 4e2ff4d859e04af8d01fd961ab56163736a731f9
- hash: c2423a732cbbc194edfc0f17145896309598ac37
- hash: 06471e1f500612f44c828e5d3453e7846f70c2d83b24c08ac9193e791f1a8130
- hash: 08fd6813f58da707282915139db973b2dbe79c11df22ad25c99ec5c8406b234a
- hash: 1801da172fae83cee2cc7c02f63e52d71f892d78e547a13718f146d5365f047c
- hash: 1d9543f7c0039f6f44c714fe8d8fd0a3f6d52fcae2a70b4bc442f38e01e14072
- hash: 2654d6f8d6c93c7af7b7b31a89ebf58348a349aa943332ebb39ce552dde81fc8
- hash: 7022f91f0534d980a4d77df20bea1ae53ee02f7c490efbfae605961f5170a580
- hash: 70ae293eb1c023d40a8a48d6109a1bf792e1877a72433bcc89613461cffc7b61
- hash: b3ce10cc997cd60a48a01677a152e21d4aa36ab5b2fd3718c04edef62662cea1
- hash: fd30a2c90384bdb266971a81f97d80a2c42b4cec5762854224e1bc5c006d007a
- ip: 77.90.153.225
- domain: elprogresofood.com
- domain: mastercompu.com
- domain: thanjainatural.com
- domain: facebook.meta-software-worldwide.com
- domain: facebook.windows-software-downloads.com
- domain: facebook.windows-software-updates.cc
- domain: facebook.windows-software-updates.com
FileFix in the wild! New FileFix campaign goes beyond POC and leverages steganography
Description
A sophisticated FileFix attack campaign has been discovered, marking the first use of this technique beyond proof-of-concept. The attack employs a complex phishing infrastructure, including a multilingual site mimicking Facebook security. It uses steganography to conceal malicious code in images, with a multistage payload delivery system featuring layered obfuscation and evasion techniques. The final payload deploys a StealC infostealer targeting various applications and credentials. The campaign has evolved rapidly over two weeks, indicating a global targeting strategy with potential victims in multiple countries. This attack represents a significant advancement in *Fix attack sophistication, combining FileFix with advanced tradecraft to maximize both evasion and impact.
AI-Powered Analysis
Technical Analysis
The FileFix campaign represents a sophisticated malware attack that has transitioned from proof-of-concept to active exploitation in the wild. This campaign employs a complex phishing infrastructure, including multilingual phishing websites that impersonate Facebook security pages to lure victims. A notable technical advancement in this campaign is the use of steganography to conceal malicious code within images, which helps evade traditional detection mechanisms. The attack utilizes a multistage payload delivery system characterized by layered obfuscation and evasion techniques, making it difficult for security tools to detect and analyze the malware at early stages. The final payload deployed is the StealC infostealer, which targets a broad range of applications and credentials, aiming to exfiltrate sensitive user data such as login credentials, session tokens, and potentially other personal or corporate information. The campaign has evolved rapidly over a short period (two weeks), indicating an agile threat actor employing advanced tradecraft to maximize evasion and impact. Indicators of compromise include multiple file hashes, IP addresses, and domains associated with the phishing infrastructure and malware delivery. The attack techniques align with several MITRE ATT&CK tactics and techniques, including credential dumping (T1003), phishing (T1566.002), obfuscated files or information (T1027), process injection (T1055), and use of steganography (T1001.003). The campaign's global targeting strategy suggests potential victims across multiple countries, with confirmed activity in Germany. The combination of social engineering, advanced obfuscation, and steganography marks a significant evolution in FileFix attack sophistication, posing a serious threat to organizations relying on user vigilance and traditional detection methods.
Potential Impact
For European organizations, the FileFix campaign poses a significant risk to confidentiality and integrity of sensitive information. The use of phishing to gain initial access exploits human factors, which remain a primary vulnerability in many organizations. Once infected, the StealC infostealer can exfiltrate credentials and other sensitive data, potentially leading to further compromise such as unauthorized access to corporate networks, financial fraud, or intellectual property theft. The multistage and obfuscated nature of the payload complicates detection and response efforts, increasing dwell time and potential damage. Given the campaign’s rapid evolution and multilingual phishing sites, organizations across Europe, especially those with employees using Facebook or related services, are at risk. The attack can disrupt business operations by compromising user accounts and potentially enabling lateral movement within networks. Additionally, the use of steganography to hide malicious code in images challenges conventional security controls, requiring more advanced detection capabilities. The campaign’s targeting of credentials also threatens the security of cloud services, email systems, and other critical infrastructure commonly used by European enterprises.
Mitigation Recommendations
1. Enhance phishing detection and user awareness training with a focus on identifying sophisticated phishing sites, especially those impersonating trusted brands like Facebook. 2. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting obfuscated and multistage payloads, including behavioral analysis to identify steganography-based code execution. 3. Implement strict email filtering and URL reputation services to block access to known malicious domains and IPs associated with this campaign (e.g., facebook.meta-software-worldwide.com, facebook.windows-software-updates.com). 4. Enforce multi-factor authentication (MFA) across all user accounts to mitigate the impact of credential theft. 5. Monitor network traffic for unusual outbound connections, especially to the identified IP 77.90.153.225 and suspicious domains. 6. Regularly update and patch all software and systems to reduce attack surface, even though no specific vulnerable versions are listed for this campaign. 7. Use threat intelligence feeds to incorporate the provided hashes and indicators of compromise into detection tools. 8. Conduct regular credential audits and implement least privilege access controls to limit the damage from stolen credentials. 9. Employ steganography detection tools or services to analyze inbound images and attachments for hidden code. 10. Establish incident response plans that include rapid containment and eradication procedures for multistage malware infections.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.acronis.com/en/tru/posts/filefix-in-the-wild-new-filefix-campaign-goes-beyond-poc-and-leverages-steganography/"]
- Adversary
- null
- Pulse Id
- 68c9744f0aaab46e25efb97d
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash3344a2d675911a0136199004cf8ec059 | — | |
hash4e2ff4d859e04af8d01fd961ab56163736a731f9 | — | |
hashc2423a732cbbc194edfc0f17145896309598ac37 | — | |
hash06471e1f500612f44c828e5d3453e7846f70c2d83b24c08ac9193e791f1a8130 | — | |
hash08fd6813f58da707282915139db973b2dbe79c11df22ad25c99ec5c8406b234a | — | |
hash1801da172fae83cee2cc7c02f63e52d71f892d78e547a13718f146d5365f047c | — | |
hash1d9543f7c0039f6f44c714fe8d8fd0a3f6d52fcae2a70b4bc442f38e01e14072 | — | |
hash2654d6f8d6c93c7af7b7b31a89ebf58348a349aa943332ebb39ce552dde81fc8 | — | |
hash7022f91f0534d980a4d77df20bea1ae53ee02f7c490efbfae605961f5170a580 | — | |
hash70ae293eb1c023d40a8a48d6109a1bf792e1877a72433bcc89613461cffc7b61 | — | |
hashb3ce10cc997cd60a48a01677a152e21d4aa36ab5b2fd3718c04edef62662cea1 | — | |
hashfd30a2c90384bdb266971a81f97d80a2c42b4cec5762854224e1bc5c006d007a | — |
Ip
Value | Description | Copy |
---|---|---|
ip77.90.153.225 | — |
Domain
Value | Description | Copy |
---|---|---|
domainelprogresofood.com | — | |
domainmastercompu.com | — | |
domainthanjainatural.com | — | |
domainfacebook.meta-software-worldwide.com | — | |
domainfacebook.windows-software-downloads.com | — | |
domainfacebook.windows-software-updates.cc | — | |
domainfacebook.windows-software-updates.com | — |
Threat ID: 68c97556c5f0f7930cac8160
Added to database: 9/16/2025, 2:33:58 PM
Last enriched: 9/16/2025, 2:34:29 PM
Last updated: 9/17/2025, 7:10:31 AM
Views: 11
Related Threats
Ongoing FileFix Attack Installs StealC Infostealer Via Fake Facebook Pages
MediumAppSuite, OneStart & ManualFinder: The Nexus of Deception
MediumAugust 2025 Infostealer Trend Report
MediumAugust 2025 APT Attack Trends Report
MediumLockerGoga Ransomware Admin on EU Most Wanted List With $10M DOJ Reward
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.