Cyber Security News

New ClickFake Interview Attack Using ClickFix Technique to Deliver GolangGhost Malware

The Lazarus Group’s long-running recruitment lure has resurfaced as “ClickFake Interview”, anchored on the freshly registered waventic[.]com site.

Candidates progress through a slick JavaScript form that ends with a bogus webcam “driver” download, actually planting the cross-platform GolangGhost malware.

Sekoia.io threat-defence researchers noted that the operators recycled the “ClickFix” web template first profiled in March 2025, but have now integrated geolocation filters and CAPTCHA to deter casual scanning.

The analysts traced more than forty companion domains spawned since April, all funnelling traffic toward apply[.]waventic[.]com before serving a statically linked Go binary compiled for Windows, Linux and macOS.

Lure website (Source – Sekoia)

The reinvigorated social engineering loop leverages stolen LinkedIn profiles and Telegram channels to appear legitimate, then abuses browser push-notifications to prompt the file transfer.

Once executed, GolangGhost immediately contacts hard-coded C2 endpoints over TLS-wrapped WebSockets, exporting a full inventory of running processes and OS-level metadata within seconds.

Early telemetry shows finance and blockchain start-ups in Europe and Southeast Asia among the first victims, with several macOS arm64 hosts already leaking credential vaults.

Delivered as a self-contained Go executable, the sample often bypasses signature-based antivirus engines that treat it as benign build output.

Infection mechanism

At launch GolangGhost drops a per-user copy into the OS-specific autostart directory and registers persistence keys named “SysDrvX %RAND%”.

The binary’s minimal footprint stems from dynamic module loading, most capabilities are fetched on demand via base64-encoded gRPC blobs.

The following excerpt, recovered during sandboxing, shows the loader decompressing its plugin package:-

blob, _ := base64.StdEncoding.DecodeString(pkg)
r, _ := zlib.NewReader(bytes.NewReader(blob))
io.Copy(os.TempDir()+"/"+modName, r)
cmd := exec.Command(os.TempDir()+"/"+modName, "-m", "init")
cmd.Start()

Security teams should monitor outbound WebSocket traffic to unfamiliar domains and flag Go executables spawning shell processes outside the user profile.

Boost detection, reduce alert fatigue, accelerate response; all with an interactive sandbox built for security teams -> Try ANY.RUN Now

Tushar Subhra Dutta

Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.

Recent Posts

CISA Details That Hackers Gained Access to a U.S. Federal Agency Network Via GeoServer RCE Vulnerability

CISA has released a comprehensive cybersecurity advisory detailing how threat actors successfully compromised a U.S.…

8 minutes ago

Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System

Google has issued an urgent security update for its Chrome web browser to address three…

4 hours ago

Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes From Initial Access

Cybersecurity professionals are facing an unprecedented acceleration in threat actor capabilities as the average breakout…

6 hours ago

New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code

A sophisticated malware campaign has emerged in the npm ecosystem, utilizing an innovative steganographic technique…

6 hours ago

Zloader Malware Repurposed to Act as Entry Point Into Corporate Environments to Deploy Ransomware

Zloader, a sophisticated Zeus-based modular trojan that first emerged in 2015, has undergone a significant…

7 hours ago

Beware of Fake Online Speedtest Application With Obfuscated JS Codes

A sophisticated malware campaign has emerged that leverages fake online speed test applications to deploy…

11 hours ago