{"id":45222,"date":"2026-04-08T19:06:17","date_gmt":"2026-04-08T11:06:17","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/08\/new-clickfix-attack-uses-node-js-malware-via-tor-to-steal-crypto\/"},"modified":"2026-04-08T19:06:17","modified_gmt":"2026-04-08T11:06:17","slug":"new-clickfix-attack-uses-node-js-malware-via-tor-to-steal-crypto","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/08\/new-clickfix-attack-uses-node-js-malware-via-tor-to-steal-crypto\/","title":{"rendered":"New ClickFix Attack Uses Node.js Malware via Tor to Steal Crypto"},"content":{"rendered":"\n<p>We\u2019ve all done it- clicked a box to prove we\u2019re not a robot without thinking twice. But according to the latest research from Netskope Threat Labs, that split-second habit is exactly what scammers are banking on. <\/p>\n<p>This operation, known as a <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/clickfix-scam-users-mapping-hacker-controlled-drives\/\" data-type=\"link\" data-id=\"https:\/\/hackread.com\/clickfix-scam-users-mapping-hacker-controlled-drives\/\">ClickFix<\/a> attack campaign, has been spreading rapidly since early 2025. While ClickFix refers to the deceptive technique used to trick you, this campaign is a professional setup specifically designed to drain cryptocurrency from <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/microsoft-whatsapp-attachments-backdoor-windows-pcs\/\" data-type=\"link\" data-id=\"https:\/\/hackread.com\/microsoft-whatsapp-attachments-backdoor-windows-pcs\/\">Windows<\/a> users.<\/p>\n<h3><strong>How the Trap is Set<\/strong><\/h3>\n<p>It starts with a fake <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/fake-captcha-scam-microsoft-tools-amatera-stealer\/\" data-type=\"link\" data-id=\"https:\/\/hackread.com\/fake-captcha-scam-microsoft-tools-amatera-stealer\/\">CAPTCHA<\/a>. When you click, you aren\u2019t verifying anything; instead, a hidden PowerShell command triggers in the background. It happens so fast that most victims have no idea their machine just reached out to cloud-verificatecom to grab a file called NodeServer-Setup-Full.msi.<\/p>\n<p>This isn\u2019t just a simple virus; it\u2019s a Remote Access Trojan (RAT). It works so well because it includes its own Node.js runtime, a built-in engine that lets the malware run on any Windows PC without needing other software. To stay hidden, it immediately uses the Tor network to mask its traffic, installs itself into a folder called LogicOptimizer, and digs into the Windows Registry to ensure it launches every time you turn on your computer.<\/p>\n<h3><strong>A Ghost in the Memory<\/strong><\/h3>\n<p>What\u2019s really worrying is how this software hides. Built on a <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/unc1069-node-js-maintainer-fake-linkedin-slack-profile\/\" data-type=\"link\" data-id=\"https:\/\/hackread.com\/unc1069-node-js-maintainer-fake-linkedin-slack-profile\/\">NodeJS<\/a> framework, it is modular, which means the most dangerous parts of the code never actually touch your hard drive because attackers steal modules dynamically from their server only when they are ready to strike. These stay in the computer&#8217;s temporary memory, making them nearly invisible to standard scans.<\/p>\n<p>Before it starts stealing, <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/github.com\/netskopeoss\/NetskopeThreatLabsIOCs\/blob\/main\/Malware\/NodeJS_MAAS\/IOCs\/README.md\">the malware<\/a> performs a &#8216;fingerprint&#8217; check to scan your system. It checks your Windows version, CPU type, and available RAM. It even looks for over 30 security products, including Windows Defender, Kaspersky, Norton, and McAfee. If the computer looks too well-protected, the malware stays quiet to avoid detection.<\/p>\n<p>\u201cThis architecture confirms the malware is both an infostealer and a RAT, the C2 capabilities documented in support.proto can execute arbitrary code, manipulate files, and run system commands,\u201d the <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.netskope.com\/blog\/from-clickfix-to-maas-exposing-a-modular-windows-rat-and-its-admin-panel\" data-type=\"link\" data-id=\"https:\/\/www.netskope.com\/blog\/from-clickfix-to-maas-exposing-a-modular-windows-rat-and-its-admin-panel\">blog post<\/a> reads.<\/p>\n<div>\n<figure><a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/clickfix-attack-node-js-malware-tor-steal-crypto.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"550\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/clickfix-attack-node-js-malware-tor-steal-crypto-1024x550.png\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/clickfix-attack-node-js-malware-tor-steal-crypto-1024x550.png 1024w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/clickfix-attack-node-js-malware-tor-steal-crypto-300x161.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/clickfix-attack-node-js-malware-tor-steal-crypto-768x413.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/clickfix-attack-node-js-malware-tor-steal-crypto-1536x826.png 1536w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/clickfix-attack-node-js-malware-tor-steal-crypto-380x204.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/clickfix-attack-node-js-malware-tor-steal-crypto-800x430.png 800w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/clickfix-attack-node-js-malware-tor-steal-crypto-1160x624.png 1160w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/clickfix-attack-node-js-malware-tor-steal-crypto.png 1626w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" alt=\"New ClickFix Attack Uses Node.js Malware via Tor to Steal Crypto\" \/><\/a><figcaption>Screenshot via Netskope Threat Lab<\/figcaption><\/figure>\n<\/p><\/div>\n<h3><strong>The Crime Factory Exposed<\/strong><\/h3>\n<p>Researchers noted that this isn\u2019t the work of a lone hacker<span style=\"margin: 0px; padding: 0px;\">\u00a0but a Malware-as-a-Service (<\/span><a href=\"https:\/\/hackread.com\/tag\/maas\/\" target=\"_blank\">MaaS<\/a><span style=\"margin: 0px; padding: 0px;\">) operation, which is a professional business in which<\/span> scammers rent a toolkit to launch their own attacks.<\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<p>The Netskope team caught a massive break when the attackers made an OPSEC failure, leaving their admin panel exposed. Recovered files like <code>support.proto<\/code> and <code>admin.proto<\/code> provided researchers with a structural map of the backend, revealing that the hackers use a protocol called gRPC to communicate with the infected computer in real-time. <\/p>\n<p>This allows the affiliate groups, the individual scammers who rent this technology, to use Tor-based communication to instantly track cryptocurrency wallets and send success alerts to their own Telegram channels.<\/p>\n<p>Nevertheless, these scammers are professional and experts at staying anonymous. Therefore, as a precautionary measure, if a verification box feels even slightly off, close the tab to protect your crypto wallet.<\/p>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"New ClickFix Attack Uses Node.js Malware via Tor to Steal Crypto\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform\u2019s trusted coverage.\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve all done it- clicked a box to prove we\u2019re not a r [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-45222","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45222"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45222\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}