Threat Actors Lure Victims Into Downloading .HTA Files Using ClickFix To Spread Epsilon Red Ransomware
A new Epsilon Red ransomware campaign has been discovered targeting users globally through fake ClickFix verification pages. Active since July 2025, the threat actors employ social engineering tactics and impersonate popular platforms like Discord, Twitch, and OnlyFans to trick users into executing malicious .HTA files via ActiveX. This method leads to silent payload downloads and ransomware deployment. The campaign uses a Clickfix-themed malware delivery site, urging victims to visit a secondary page where malicious shell commands are executed. The attackers also impersonate various streaming services and use romance-themed lures. Epsilon Red, first observed in 2021, shows some similarities to REvil ransomware in its ransom note styling but appears distinct in its tactics and infrastructure.
AI Analysis
Technical Summary
The threat involves a newly observed campaign by the Epsilon Red ransomware group, active since July 2025, leveraging social engineering and drive-by download techniques to infect victims globally. Attackers create fake ClickFix verification web pages that impersonate popular platforms such as Discord, Twitch, and OnlyFans, as well as various streaming services, to lure users into downloading malicious .HTA (HTML Application) files. These .HTA files exploit ActiveX controls to silently execute shell commands and download ransomware payloads without user awareness. The campaign also uses romance-themed lures to increase victim engagement. Epsilon Red ransomware, first seen in 2021, shares ransom note stylistic similarities with REvil ransomware but operates with distinct tactics and infrastructure. The infection chain starts with phishing or social engineering to convince users to run the .HTA files, which then execute commands to deploy the ransomware. Indicators of compromise include specific file hashes, malicious domains (e.g., capchabot.cc, twtich.cc), and IP addresses. The attack leverages techniques such as T1053.005 (Scheduled Task/Job), T1036 (Masquerading), T1027 (Obfuscated Files or Information), T1486 (Data Encrypted for Impact), T1059.003 (Windows Command Shell), T1189 (Drive-by Compromise), T1071.001 (Web Protocols), T1059.005 (Visual Basic), and T1204.001 (User Execution). No known exploits in the wild are reported, but the campaign relies heavily on user interaction and social engineering to succeed.
Potential Impact
For European organizations, this ransomware campaign poses significant risks including data encryption leading to operational disruption, potential data loss, and financial impact due to ransom payments or recovery costs. The use of social engineering targeting popular platforms increases the likelihood of successful infection among employees and users who interact with these services. The silent execution of payloads via ActiveX and .HTA files can bypass some traditional detection mechanisms, leading to delayed incident response. Critical sectors such as finance, healthcare, and media streaming services in Europe could face severe availability and confidentiality impacts. Additionally, the impersonation of well-known platforms may erode user trust and complicate phishing awareness efforts. Given the ransomware's destructive nature, organizations may suffer reputational damage and regulatory penalties, especially under GDPR if personal data is compromised or unavailable.
Mitigation Recommendations
1. Implement strict email and web filtering to block access to known malicious domains and URLs such as capchabot.cc and twtich.cc. 2. Disable or restrict execution of .HTA files and ActiveX controls via group policies or endpoint protection solutions to prevent drive-by downloads and silent execution. 3. Conduct targeted user awareness training focusing on recognizing phishing attempts that impersonate popular platforms and romance-themed lures. 4. Employ application whitelisting to prevent unauthorized execution of scripts and executables, including .HTA files. 5. Monitor for indicators of compromise such as the provided file hashes and IP addresses within network and endpoint detection systems. 6. Regularly back up critical data with offline or immutable backups to ensure recovery without paying ransom. 7. Use endpoint detection and response (EDR) tools to detect suspicious shell command executions and lateral movement attempts. 8. Keep all systems and security solutions updated to reduce attack surface and improve detection capabilities. 9. Limit user privileges to reduce the impact of successful execution of malicious code. 10. Establish incident response plans specific to ransomware attacks, including containment and eradication procedures.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- hash: 2db32339fa151276d5a40781bc8d5eaa
- hash: 98107c01ecd8b7802582d404e007e493
- hash: adf4fe80ccef030466c9d12b4340ea0a3fd02d9a
- hash: e0a69439563c8534c2ef842d4ffcb16696f286d16585186de20351892f9917f1
- ip: 155.94.155.227
- ip: 213.209.150.188
- domain: capchabot.cc
- domain: twtich.cc
Threat Actors Lure Victims Into Downloading .HTA Files Using ClickFix To Spread Epsilon Red Ransomware
Description
A new Epsilon Red ransomware campaign has been discovered targeting users globally through fake ClickFix verification pages. Active since July 2025, the threat actors employ social engineering tactics and impersonate popular platforms like Discord, Twitch, and OnlyFans to trick users into executing malicious .HTA files via ActiveX. This method leads to silent payload downloads and ransomware deployment. The campaign uses a Clickfix-themed malware delivery site, urging victims to visit a secondary page where malicious shell commands are executed. The attackers also impersonate various streaming services and use romance-themed lures. Epsilon Red, first observed in 2021, shows some similarities to REvil ransomware in its ransom note styling but appears distinct in its tactics and infrastructure.
AI-Powered Analysis
Technical Analysis
The threat involves a newly observed campaign by the Epsilon Red ransomware group, active since July 2025, leveraging social engineering and drive-by download techniques to infect victims globally. Attackers create fake ClickFix verification web pages that impersonate popular platforms such as Discord, Twitch, and OnlyFans, as well as various streaming services, to lure users into downloading malicious .HTA (HTML Application) files. These .HTA files exploit ActiveX controls to silently execute shell commands and download ransomware payloads without user awareness. The campaign also uses romance-themed lures to increase victim engagement. Epsilon Red ransomware, first seen in 2021, shares ransom note stylistic similarities with REvil ransomware but operates with distinct tactics and infrastructure. The infection chain starts with phishing or social engineering to convince users to run the .HTA files, which then execute commands to deploy the ransomware. Indicators of compromise include specific file hashes, malicious domains (e.g., capchabot.cc, twtich.cc), and IP addresses. The attack leverages techniques such as T1053.005 (Scheduled Task/Job), T1036 (Masquerading), T1027 (Obfuscated Files or Information), T1486 (Data Encrypted for Impact), T1059.003 (Windows Command Shell), T1189 (Drive-by Compromise), T1071.001 (Web Protocols), T1059.005 (Visual Basic), and T1204.001 (User Execution). No known exploits in the wild are reported, but the campaign relies heavily on user interaction and social engineering to succeed.
Potential Impact
For European organizations, this ransomware campaign poses significant risks including data encryption leading to operational disruption, potential data loss, and financial impact due to ransom payments or recovery costs. The use of social engineering targeting popular platforms increases the likelihood of successful infection among employees and users who interact with these services. The silent execution of payloads via ActiveX and .HTA files can bypass some traditional detection mechanisms, leading to delayed incident response. Critical sectors such as finance, healthcare, and media streaming services in Europe could face severe availability and confidentiality impacts. Additionally, the impersonation of well-known platforms may erode user trust and complicate phishing awareness efforts. Given the ransomware's destructive nature, organizations may suffer reputational damage and regulatory penalties, especially under GDPR if personal data is compromised or unavailable.
Mitigation Recommendations
1. Implement strict email and web filtering to block access to known malicious domains and URLs such as capchabot.cc and twtich.cc. 2. Disable or restrict execution of .HTA files and ActiveX controls via group policies or endpoint protection solutions to prevent drive-by downloads and silent execution. 3. Conduct targeted user awareness training focusing on recognizing phishing attempts that impersonate popular platforms and romance-themed lures. 4. Employ application whitelisting to prevent unauthorized execution of scripts and executables, including .HTA files. 5. Monitor for indicators of compromise such as the provided file hashes and IP addresses within network and endpoint detection systems. 6. Regularly back up critical data with offline or immutable backups to ensure recovery without paying ransom. 7. Use endpoint detection and response (EDR) tools to detect suspicious shell command executions and lateral movement attempts. 8. Keep all systems and security solutions updated to reduce attack surface and improve detection capabilities. 9. Limit user privileges to reduce the impact of successful execution of malicious code. 10. Establish incident response plans specific to ransomware attacks, including containment and eradication procedures.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.cloudsek.com/blog/threat-actors-lure-victims-into-downloading-hta-files-using-clickfix-to-spread-epsilon-red-ransomware"]
- Adversary
- Epsilon Red
- Pulse Id
- 68835c6e2b2796aec0bd0a60
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash2db32339fa151276d5a40781bc8d5eaa | — | |
hash98107c01ecd8b7802582d404e007e493 | — | |
hashadf4fe80ccef030466c9d12b4340ea0a3fd02d9a | — | |
hashe0a69439563c8534c2ef842d4ffcb16696f286d16585186de20351892f9917f1 | — |
Ip
Value | Description | Copy |
---|---|---|
ip155.94.155.227 | — | |
ip213.209.150.188 | — |
Domain
Value | Description | Copy |
---|---|---|
domaincapchabot.cc | — | |
domaintwtich.cc | — |
Threat ID: 68837986ad5a09ad00500ac9
Added to database: 7/25/2025, 12:33:10 PM
Last enriched: 7/25/2025, 12:47:45 PM
Last updated: 7/25/2025, 2:51:40 PM
Views: 4
Related Threats
New Advanced Stealer (SHUYAL) Targets Credentials Across 19 Popular Browsers
MediumAndroid Malware Posing As Indian Bank Apps
MediumKoske, a new AI-Generated Linux malware appears in the threat landscape
MediumThreatFox IOCs for 2025-07-24
MediumCoyote malware is first-ever malware abusing Windows UI Automation
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.