ClickFix Campaigns Targeting Windows and macOS

Executive Summary

Insikt Group identified five distinct clusters leveraging the ClickFix social engineering technique to facilitate initial access to host systems. Observed since at least May 2024, these clusters include those impersonating financial application Intuit QuickBooks and the travel agency Booking.com. Insikt Group leveraged the Recorded Future® HTML Content Analysis dataset, which enables systematic monitoring of embedded web artifacts to identify and track new malicious domains and infrastructure.

The clusters demonstrate significant operational variance in lure themes and infrastructure patterns, and highlight the technique's evolution, moving past simple verification by visually fooling victims with various fake challenges and demonstrating technical sophistication through operating system detection to tailor execution chains. Despite these structural differences, its operation is largely the same, showing that ClickFix’s core techniques work across platforms and only the social engineering lure needs to be adapted to the victim. Threat actors manipulate victims into executing malicious, obfuscated commands directly within native system tools like the Windows Run dialog box or macOS Terminal.

This living-off-the-land (LotL) approach allows malicious scripts to execute in-memory, effectively bypassing traditional browser security and endpoint controls. Parallel clusters targeting sectors as diverse as accounting, real estate, and legal services indicates that ClickFix has transitioned into a standardized, high-ROI template for both cybercriminal and potentially advanced persistent threat (APT) groups.

To protect against these threats, security defenders should move beyond simple indicator blocking and prioritize aggressive behavioral hardening. Key recommendations include disabling the Windows Run dialog box via Group Policy Objects (GPO), implementing PowerShell Constrained Language Mode (CLM), and operationalizing Digital Risk Prevention tools such as Recorded Future's Malicious Websites to identify and mitigate threats to your digital assets.

Based on increasing use since 2024, Insikt Group assesses that the ClickFix methodology will very likely remain a primary initial access vector throughout 2026 as threat actors continue to social engineer victims to enable exploitation. Looking ahead, Insikt Group anticipates ClickFix lures will become increasingly technically adaptive, incorporating more selective browser fingerprinting, while continuing to use infrastructure that can be built and dismantled quickly. In addition to technical refinements, Insikt Group predicts that the social engineering component will continue to evolve, leveraging new techniques to lure victims into executing malicious commands.

Key Findings

Background

First documented in late 2023, ClickFix has transitioned from a niche social engineering tactic to a cornerstone of the global cybercriminal ecosystem. ClickFix is a social engineering methodology that lures victims into manually executing malicious commands by masquerading as a necessary technical resolution for fabricated system errors or human-verification prompts. This technique represents an evolutionary shift from the FakeUpdates (SocGholish) model, prioritizing manual user intervention to evade the increasingly robust security features of modern web browsers and automated endpoint detection systems. In this context, the methodology embodies a "think smart, not hard" approach. The simplicity of relying on a manual user action makes it a potent defensive evasion tactic: bypassing typical browser-based security makes it difficult to detect, while the high number of threat actors using it makes it difficult to track across a fragmented threat landscape.

The technical core of the methodology relies primarily on pastejacking, where background JavaScript populates a victim's clipboard with an obfuscated command while they are distracted by visual lures such as fraudulent reCAPTCHA or Cloudflare Turnstile overlays. In some instances, malicious commands are not automatically pasted into the victim’s clipboard, but rather, victims are manipulated into copying and running the command manually. By leveraging a living-off-the-land (LotL) approach, threat actors manipulate users into executing these commands directly within trusted system tools like the Windows Run dialog box, PowerShell, or the macOS Terminal. This user-assisted execution allows malicious scripts to execute silently and bypass traditional browser and endpoint security perimeters.

ClickFix has been weaponized by a diverse spectrum of threat actors, ranging from high-volume initial access brokers (IABs) to sophisticated state-sponsored groups such as BlueDelta (aka APT28) and the North Korean group PurpleBravo. The methodology enables a repeatable and scalable delivery framework capable of deploying a wide variety of secondary payloads, including infostealers like Lumma Stealer and Vidar, or remote access trojans (RATs) such as NetSupport RAT and Odyssey Stealer. These operations are frequently supported by highly adaptive, disposable infrastructure designed to maintain operational continuity even as individual domains are identified and blocked.

Technical Analysis

Insikt Group identified and tracked five emerging ClickFix clusters by leveraging the Recorded Future HTML Content Analysis dataset, which enables the systematic monitoring of embedded web artifacts. By pivoting on unique technical identifiers, including specific Document Object Model (DOM) hashes, hard-coded image source tags, and unique page titles, Insikt Group mapped ClickFix’s infrastructure and identified new malicious domains and infrastructure, facilitating the discovery of active domains and near real-time monitoring of cluster evolution.

Across the analyzed clusters, Insikt Group detailed the ClickFix commands victims were manipulated into executing on their systems. These commands relied heavily on LOLBins to achieve operational goals. By using LOLBins, threat actors leveraged native, legitimately signed executables to download malicious payloads to a victim's machine. Depending on the security implementation of personal machines or corporate endpoints, this methodology can effectively evade standard detections and foundational security principles.

ClickFix Clusters

Insikt Group identified five clusters (see Figure 1) that exhibited significant operational variance despite a shared reliance on the ClickFix social engineering technique. These clusters were defined by their infrastructure patterns and targeting approaches, ranging from logistics-themed lures to dual-platform selection logic. This indicates that the ClickFix methodology is being deployed across a fragmented ecosystem of threat actors, each tailoring the technique to suit their own delivery requirements and victim profiles.

These clusters were grouped based on observable patterns in infrastructure reuse, lure formatting, platform targeting, and operational adjustments over time. While core technical elements and delivery mechanisms overlap, each cluster maintained a distinct footprint within the broader landscape. Insikt Group categorized the activity into the following five clusters:

Figure 1: Overview of ClickFix and associated clusters (Source: Recorded Future)

Cluster 1: Intuit QuickBooks

Cluster 1 was observed operating from January 2026 to the time of writing, primarily targeting organizations through social engineering lures impersonating the accounting software Intuit QuickBooks. QuickBooks is widely used for tax preparation in the United States; given the campaign's active window coincides with the US tax season (typically January through April 15), Insikt Group assesses with moderate confidence that the timing was a calculated effort to target entities engaged in financial reporting. Although this cluster recently pivoted to targeting users of the US real estate marketplace Zillow, QuickBooks-related artifacts and brand-specific imagery remain deeply embedded throughout the Document Object Model (DOM) of the malicious landing pages.

Cluster 1 Profile

Figure 2: Overview of ClickFix Cluster 1 — Intuit QuickBooks (Source: Recorded Future)
Table 1: PowerShell commands observed across Cluster 1

Cluster 1 Infection Chain

The infection chain begins when a victim lands on a ClickFix landing page. The page presents a fraudulent human-verification interface (see Figure 3) that instructs the victim to complete specific "verification" steps.

Figure 3: Intuit QuickBooks-themed ClickFix page (Source: Recorded Future Web Scans)

By interacting with the page, the victim unknowingly copies a malicious command to their system clipboard. The technique often results in execution through native system utilities, such as Windows Run dialog and PowerShell, leveraging LOLBins to evade traditional browser and endpoint-based security controls.

Upon pasting the command, an obfuscated PowerShell script (Figure 4) executes in a hidden window. This stager uses self-referential function names to dynamically construct and invoke Invoke-RestMethod to the domain nobovcs[.]com.

Figure 4: Obfuscated PowerShell command executed in a hidden window, dynamically reconstructing and invoking code via iex (Source: Recorded Future)

This request triggers the retrieval of a short PowerShell stager (see Figure 5) that downloads a second-stage payload, bibi.php, saving it to the %TEMP% directory as script.ps1. This stager is the initial execution step that kicks off the NetSupport RAT installation.

Figure 5: Stager script to download second-stage script, bibi.php (Source: Recorded Future)

The bibi.php script is essential for the final deployment phase and for obfuscating on-disk artifacts. It contains a function called Get-RomanticName, which selects and combines strings from a thematic wordlist, including terms such as "Heart", "Soul", and "Desire", to generate a randomized folder name under %LOCALAPPDATA%, where the staging files are placed.

The script retrieves four primary files from nobovcs[.]com, detailed in Table 2.

Filename
SHA-256
at.7z
c0af6e9d848ada3839811bf33eeb982e6c207e4c40010418e0185283cd5cff50
lnk.7z
5d821db386c7c879caeabf3e9f94c94a48eec6ec5a3a0efbae9d69da3f52c1db
7z.exe
43907e54cf3d1258f695d1112759b5457576481072cc76a679b8477cfeb3db87
7z.dll
b17c3e4058aacdcc36b18858d128d6b3058e0ea607a4dc59eb95b18b7c6acc7c

Table 2: Filenames and SHA256 hashes of the files downloaded from nobovcs[.]com (Source: Recorded Future)

The script uses 7z.exe to extract at.7z (protected by the password “pppp”), which contains the NetSupport RAT binary, neservice.exe. Persistence is established by hijacking Startup shortcuts; if no existing shortcut is detected, the script extracts lnk.7z to the Startup folder to ensure the payload launches automatically upon system reboot.

Following successful execution, the binary neservice.exe performs an HTTP GET request to gologpoint[.]com to initiate command-and-control (C2) communications. gologpoint[.]com resolves to the IP address 62[.]164[.]177[.]230.

Cluster 2: Booking.com

Cluster 2 was observed operating from February 2026 to the time of writing, impersonating the travel agency Booking.com. Insikt Group tracked the cluster by pivoting on a unique DOM hash made possible by the threat actor’s repeated use of a unique HTML title and consistent image files. Indicators of compromise (IoCs) tagged in this cluster can be seen in the Recorded Future HTML Content Analysis. The landing pages for this cluster use a counterfeit reCAPTCHA v2 challenge, requiring victims to select all photos containing a "bucket" (Figure 6). Insikt Group observed that the same challenge photos are presented in the same order across all analyzed pages.

Cluster 2 Profile

Figure 7: Overview of ClickFix Cluster 2 — Booking.com (Source: Recorded Future)
Table 3: PowerShell commands observed across Cluster 2

Cluster 2 Infection Chain

The process begins when a victim interacts with the fake challenge. Upon completing the challenge, the victim is redirected to a verification page where a malicious PowerShell command (see Figure 8) is copied to the system clipboard. Instructions on the verification page manipulate the victim into opening the Windows Run dialog box and entering the command. Executing this malicious command starts the infection chain for NetSupport RAT.

Figure 8: Command from the booking campaign that reaches out to the payload server (Source: Recorded Future)

The PowerShell command provided in script.ps1 (see Figure 9) executes with the -NoProfile and -ExecutionPolicy Bypass flags to evade standard logging and security restrictions. Following execution, the system pulls four staging files to a directory named DesireSpark Serenade. This directory naming convention is functionally identical to the "romantic" naming methodology observed in Cluster 1.

Figure 9: DOM file from checkpulse[.]com that details the command to be run on the victim machine, suppressing the protections normally in place to pull down the PowerShell command and execute it (Source: Recorded Future)

The primary staging mechanism relies on script.ps1 to pull secondary payloads from the staging server. In one analyzed instance, scripts originating from thestayreserve[.]com reached out to checkpulses[.]com to retrieve the files detailed in Table 4.

Filename
SHA-256
at.7z
397dcea810f733494dbe307c91286d08f87f64aebbee787706fe6561ed3e20f8
lnk.7z
5d821db386c7c879caeabf3e9f94c94a48eec6ec5a3a0efbae9d69da3f52c1db
7z.exe
43907e54cf3d1258f695d1112759b5457576481072cc76a679b8477cfeb3db87
7z.dll
b17c3e4058aacdcc36b18858d128d6b3058e0ea607a4dc59eb95b18b7c6acc7c

Table 4: Filenames and SHA256 hashes of the files downloaded from checkpulses[.]com (Source: Recorded Future)

The 7z.exe utility is used to extract at.7z, which contains the NetSupport RAT binary neservice.exe. Persistence is established by adding a link to the system Startup folder.

The domains observed across this cluster use a similar PowerShell command pattern. However, once the command is executed, the infection chain varies slightly with the staging infrastructure being called. In the cases of sign-in-op-token[.]com and the thestayreserve[.]com domains, the malicious command is identical in terms of pattern and organization, but the hard-coded dropper domain is bkng-updt[.]com and checkpulses[.]com, respectively.

While staging domains vary, the final payloads across this cluster converge on the same NetSupport RAT C2 infrastructure (Table 5).

Click Fix Domain
IP Address
Dropper
NetSupport RAT C2
sign-in-op-token[.]com
91[.]202[.]233[.]206

bkng-updt[.]com

77[.]91[.]65[.]144

hotelupdatesys[.]com

152[.]89[.]244[.]70

thestayreserve[.]com
91[.]202[.]233[.]206

checkpulses[.]com

77[.]91[.]65[.]31

chrm-srv[.]com

ms-scedg[.]com

152[.]89[.]244[.]70

Table 5: IoCs observed in the Booking.com infection chain (Source: Recorded Future)

Following installation, the malware from thestayreserve[.]com initiates communication (Figure 10) with chrm-srv[.]com and ms-scedg[.]com, both of which resolve to 152[.]89[.]244[.]70. The domain hotelupdatesys[.]com , resolves to the same IP address as the NetSupport RAT C2 for sign-in-op-token[.]com.

Figure 10: POST Request from sign-in-op-token[.]com showing NetSupport interaction (Source: Recorded Future)

Cluster 3: Birdeye

Cluster 3 was observed operating from May 2024 until the time of writing. Previously reported on by Insikt Group, this cluster uses infrastructure centered on domains incorporating the keyword "bird" to deliver its ClickFix lure pages, trackable in Recorded Future’s HTML Content Analysis. These lures spoof Birdeye, an AI marketing company, to manipulate victims into executing malicious commands.

Cluster 3 Profile

Figure 11: Overview of ClickFix Cluster 3 — Birdeye (Source: Recorded Future)
Table 6: PowerShell command observed across Cluster 3

Cluster 3 Infection Chain

The infection chain begins when a victim visits a compromised site and is presented with a Cloudflare-style CAPTCHA challenge. Upon interacting with the page, the victim is prompted to run a command in the Windows Run dialog box. Insikt Group identified this cluster by pivoting on unique technical identifiers within the HTML artifacts, including a consistent and unique page title and a static image used across the infrastructure.

The command the victim is manipulated into running causes the victim’s device to reach out to alababababa[.]cloud to download a payload from hxxps[://]alababababa[.]cloud/cVGvQio6[.]txt. To further reduce suspicion, once the malicious command is executed, the victim is redirected to the legitimate birdeye.com website (see Figure 12).

Figure 12: The redirect to the legitimate Birdeye website (Source: Recorded Future)

Analysis of the JavaScript within the DOM for this cluster, provided in Appendix F, revealed insights into the threat actor's methods. A notable portion of the script uses seven obfuscated lines that are concatenated into a single string to be attached to the victim's clipboard. The developer left comments within the code that detail the deobfuscated purpose of each line. For example, one comment explicitly identifies the portion of the command calling PowerShell with specific flags (Figure 13).

Figure 13: Portion of JavaScript containing threat actor comments (Source: Recorded Future)

Furthermore, a comment written in Cyrillic at the beginning of the script translates to, "This should help bypass Cloudflare static analysis". This internal documentation suggests the threat actor is purposefully detailing their actions to refine bypass techniques against security scanners.

Historically, alababababa[.]cloud has been associated with the delivery of multiple malware strains, including Lumma Stealer and RedLine Stealer. The large volume of domains identified in this cluster, exceeding 40 unique entries, highlights the scale of the "run and repeat" model used to sustain this activity.

Cluster 4: Dual-Platform Selection

Cluster 4 was observed operating from March 2025 to the time of writing. This cluster is unique for its use of operating system detection to deliver tailored ClickFix lures for both Windows and macOS users. Unlike standard ClickFix behavior that typically pushes commands to the clipboard automatically, this variant provides detailed manual instructions, requiring the victim to open native system tools and manually copy and paste the provided staging payload. One of the ClickFix pages used to analyze this behavior was macosapp-apple[.]com, hosted at IP address 45[.]144[.]233[.]192.

Cluster 4 Profile

Figure 14: Overview of ClickFix Cluster 4 — Dual-Platform Selection (Source: Recorded Future)
Table 7: Encoded commands observed across Cluster 4

Cluster 4 Infection Chain

The infection chain begins when a victim lands on a ClickFix page that instructs them to verify they are human (Figure 15).

Figure 15: ClickFix page identified in Cluster 4 (Source: Recorded Future Web Scans)
Figure 23: Landing page for mac-os-helper[.]com (Source: Recorded Future)

Once the Terminal is open, the victim is prompted to execute a multi-stage command that purportedly "finds and removes temporary system files".

In reality, these commands (see Table 9) use different encoding layers to hide their true intent; the first example decodes a hexadecimal string to reveal a Base64-encoded client URL (curl) instruction, while the second directly decodes a Base64 string to run an executable command. Both methods ultimately bypass simple pattern matching by obfuscating the malicious payload until execution.

Table 9: Encoded and obfuscated ClickFix commands for macOS (Source: Recorded Future)

As shown in Table 10, the revealed curl instruction uses a compound set of arguments, in this cluster, -kfsSL, to facilitate silent delivery. These flags ensure that Transport Layer Security (TLS) certificate checks are bypassed, server-side errors are suppressed, and the process remains hidden from the user's view while following redirections to reach the final payload domain.

Table 10: Decoded and deobfuscated ClickFix commands for macOS (Source: Recorded Future)

Based on historic evidence (1, 2) and forensic patterns, Insikt Group assesses with high confidence that the information stealer MacSync was the primary payload used to infect victims in this cluster. The malicious commands on these pages caused the infected systems to reach out to a specific set of staging and C2 infrastructure, detailed in Table 11. Notably, while the domains varied, they were frequently observed behind Cloudflare to complicate network-level blocking.

Indicator
IP Address
ASN
First Seen
Last Seen
octopox[.]com
Cloudflare
Cloudflare
2026-02-06
2026-03-05
joeyapple[.]com
Cloudflare
Cloudflare
2026-02-04
2026-03-05

Table 11: C2 servers identified for the macOS cleaner campaign (Source: Recorded Future)

Copy Command Analysis

Insikt Group analyzed commands across the five clusters identified in this research. While the visual lures and impersonated brands vary between groups like Cluster 1 (Intuit QuickBooks) and Cluster 5 (macOS Storage Cleaning), the underlying execution logic remains consistent. This "run and repeat" methodology relies on a narrow set of trusted LOLBins and lightweight obfuscation to stage remote code with minimal forensic artifacts.

The technical implementation of ClickFix follows a standardized four-stage pattern across all target operating systems, as summarized in Table 12.

Stage
Action
Technical Intent
Obfuscated Input
Input of highly encoded or fragmented strings
Bypass static analysis and signature-based detection
Native Execution
Leveraging trusted system shells (zsh, bash, or powershell.exe)
Execute the initial stager using legitimate system binaries
Remote Ingress
Initiation of external requests to threat actor-controlled IPs or domains
Download secondary scripts or payloads from the staging infrastructure
In-Memory Execution
Piping downloaded content directly into an interpreter
Ensure no malicious files are initially saved to disk to evade endpoint security

Table 12: Standardized four-stage ClickFix execution pattern (Source: Recorded Future)

Insikt Group identified two primary command styles used in macOS-centric campaigns, such as Cluster 4 and Cluster 5, which are detailed in Table 13.

Technique
Observed Pattern
Defender Insight
Multi-Stage Encoding
Hex -> Base64 -> ZSH
The use of xxd -r -p in a user-initiated command is a significant indicator of malicious intent, as it is rarely used in legitimate troubleshooting.
Persistence and Backgrounding
Use of nohup and the & operator
This ensures the malicious process continues to run in the background even after the user closes the terminal, providing persistence during staging.

Table 13: Observed tactics, techniques, and procedures (TTPs) for macOS and Linux (zsh and bash) commands (Source: Recorded Future)

Windows-based commands, particularly those observed in Cluster 1 and Cluster 2, exhibit a higher degree of sophistication through "Command Swizzling" and case randomization, as shown in Table 14.

Technique
Observed Pattern
Defender Insight
Parameter Obfuscation
Randomized casing and shortened aliases (for example, -wINDoW MiNI, -wi mi, or -w h)
Threat actors use these to evade security tools looking for literal strings like "Hidden" or "Minimized".
The "Golden" Pattern
Combining Invoke-RestMethod (irm) with Invoke-Expression (iex)
This allows for the seamless retrieval and execution of remote code entirely in memory. This combination is a high-fidelity hunt for ClickFix activity.
String Manipulation Deception
Using .Substring() or .Replace() to "build" commands
Clusters like Cluster 1 avoid explicitly typing iex to bypass static signature detections.

Table 14: Observed TTPs for Windows (PowerShell) commands (Source: Recorded Future)

Mitigations

To mitigate the threats posed by ClickFix social engineering and related living-off-the-land (LotL) techniques, Insikt Group recommends a defense-in-depth approach that combines proactive intelligence monitoring with aggressive hardening of native system utilities.

Outlook

The identification of five parallel operational clusters targeting diverse sectors, including accounting, travel, real estate, and legal services, indicates that the ClickFix methodology has transitioned from a niche technique to a standardized template within the cybercriminal ecosystem. This standardized "run and repeat" model is facilitating broader adoption by both lower-tier "traffers" and sophisticated advanced persistent threat (APT) groups. Threat actors are able to maintain operational continuity even when individual domains are blocked due to the availability of disposable infrastructure and shared technical templates.

Insikt Group assesses with high confidence that the ClickFix methodology will very likely remain a heavily used initial access vector throughout 2026. The continued success of ClickFix is driven by its ability to bypass advanced browser-based security controls by shifting the point of exploitation to user-assisted manual actions. As long as native system utilities such as PowerShell and Terminal remain accessible to end-users, ClickFix will continue to offer threat actors a high-return, low-complexity alternative to traditional exploit kits.

Looking ahead, ClickFix lures will likely become increasingly technically adaptive. Future iterations are expected to incorporate more granular browser fingerprinting to conditionally serve payloads based on a victim's hardware, geographic location, or organizational profile. Furthermore, since threat actors are already purposefully documenting bypass techniques for static analysis engines within their code, Insikt Group anticipates a long-term trend toward more resilient and obfuscated staging environments. This convergence of sophisticated social engineering and LotL techniques necessitates a shift in defensive strategy, moving away from simple indicator blocking toward aggressive behavioral hardening of the system utilities that ClickFix relies upon.

Appendix A: Indicators of Compromise

Appendix B: Cluster 1 — Intuit QuickBooks Indicators

Domain
IP Address
ASN/AS
First Seen
Last Seen
mrinmay[.]net
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-21
2026-03-05
guypinions[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-20
2026-02-25
4freepics[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-20
2026-02-24
ariciversontile[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-20
2026-02-25
quiptly[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-20
2026-02-25
anthonydee[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-20
2026-02-26
ned.coveney-ltd[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2025-10-10
2025-11-20
grandmastertraders[.]traderslinkfx[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2025-12-01
2026-02-24
nhacaired88[.]com
193[.]58[.]122[.]97
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-10
2026-03-05
elive777a[.]com
94[.]156[.]112[.]115
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-02
2026-03-05
fomomforhealth[.]com
94[.]156[.]112[.]115
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-02
2026-03-05
suedfactoring[.]it[.]com
45[.]93[.]20[.]141
Chang Way Technologies Co. Limited (AS57523)
2026-01-30
2026-02-09
shopifyservercloud[.]com
45[.]93[.]20[.]50
Chang Way Technologies Co. Limited (AS57523)
2026-01-10
2026-03-05
elive123go[.]com
45[.]93[.]20[.]50
Chang Way Technologies Co. Limited (AS57523)
2026-01-09
2026-03-05
hostmaster[.]extracareliving[.]com
45[.]93[.]20[.]50
Chang Way Technologies Co. Limited (AS57523)
2026-01-25
2026-03-05
orkneygateway[.]com
45[.]93[.]20[.]50
Chang Way Technologies Co. Limited (AS57523)
2025-12-14
2026-03-05
ustazazharidrus[.]com
87[.]236[.]16[.]20
Beget LLC (AS198610)
2026-02-02
2026-03-05
45[.]93[.]20[.]50
Chang Way Technologies Co. Limited (AS57523)
2026-01-09
2026-02-01
deinhealthcoach[.]com
193[.]222[.]99[.]212
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-16
2026-03-05
bancatangcode[.]com
193[.]222[.]99[.]212
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-16
2026-03-05
billiardinstitute[.]com
193[.]58[.]122[.]97
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-10
2026-03-05
yvngvualr[.]com
Cloudflare
Cloudflare
2025-04-06
2026-03-05
visitbundala[.]com
Cloudflare
Cloudflare
2025-03-10
2026-03-05
surecomforts[.]com
45[.]93[.]20[.]50
Chang Way Technologies Co. Limited (AS57523)
2026-01-09
2026-03-05
theinvestworthy[.]com
45[.]93[.]20[.]50
Chang Way Technologies Co. Limited (AS57523)
2025-12-13
2026-03-05
customblindinstall[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-21
2026-03-05
extracareliving[.]com
45[.]93[.]20[.]50
Chang Way Technologies Co. Limited (AS57523)
2025-12-14
2026-03-05
subsgod[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-21
2026-03-05
traderslinkfx[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-21
2026-03-05

Appendix C: bibi.php Script

Appendix D: Cluster 2 — Booking.com Indicators

Indicator
IP Address
ASN
First Seen
Last Seen
sign-in-op-token[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-03-01
2026-03-03
thestayreserve[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-23
2026-02-24
accountpulse[.]help
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-16
2026-03-05
admin-activitycheck[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-22
2026-02-27
accountmime[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-21
2026-02-24
checkhelpdesk[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-18
2026-02-23
thepulseactivity[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-18
2026-02-23
checkaccountactivity[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-17
2026-02-23
account-helpdesk[.]top
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-15
2026-02-18
pulse-help-desk[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-13
2026-02-19
account-helpdesk[.]icu
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-10
2026-03-02
account-helpdesk[.]info
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-08
2026-02-11
helpdeskpulse[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-06
2026-02-09
account-help[.]info
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-08
2026-03-05
acconthelpdesk[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-05
2026-03-03

Appendix E: Cluster 3 — Birdeye Indicators

Indicator
IP Address
ASN
First Seen
Last Seen
acebirdrep[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
bebirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrankbox[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrankfx[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrankgo[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrankinc[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrankllc[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrankmax[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdranktip[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrankup[.]com
Cloudflare
Cloudflare
2024-05-17
2026-03-05
birdrankus[.]com
Cloudflare
Cloudflare
2024-05-17
2026-03-05
birdrankusa[.]com
Cloudflare
Cloudflare
2024-05-16
2024-05-16
birdrankvip[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrankzen[.]com
Cloudflare
Cloudflare
2024-05-17
2026-03-05
birdrepbiz[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrepgo[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrephelp[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdreplab[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrepsys[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrepusa[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrepuse[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
bitbirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
bitbirdrep[.]com
Cloudflare
Cloudflare
2024-05-17
2026-03-05
fixbirdrank[.]com
Cloudflare
Cloudflare
2024-05-17
2026-03-05
getbirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
gobirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
helpbirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
helpbirdrep[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
infobirdrep[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
justbirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
mybirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
nowbirdrank[.]com
Cloudflare
Cloudflare
2024-05-17
2026-03-05
optbirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
probirdrep[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
topbirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
topbirdrep[.]com
Cloudflare
Cloudflare
2024-05-17
2026-03-05
usbirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2024-05-16
usebirdrep[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
vipbirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05

Appendix F: Birdeye Cluster Javascript

Appendix G: Cluster 4 — Dual-Platform Selection Indicators

Indicator
IP Address
ASN
First Seen
Last Seen
valetfortesla[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-11-12
2026-03-05
macxapp[.]org
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-18
2025-06-18
apposx[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-13
2025-06-24
cryptonews-info[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-18
2025-12-20
macosx-app[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-14
2025-06-16
cryptoinfnews[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-14
2025-06-30
macxapp[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-14
2025-06-16
cryptoinfo-allnews[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-13
2025-06-30
appxmacos[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-13
2025-06-30
appmacintosh[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-12
2025-06-13
macosxappstore[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-09
2025-06-30
macosx-apps[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-09
2025-06-11
cryptoinfo-news[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-08
2025-06-29
financementure[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-05-27
2025-06-30
appsmacosx[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-05-27
2025-06-09
appmacosx[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-05-27
2025-06-14
macosxapp[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-05-27
2025-06-09
macosapp-apple[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-05-25
2025-05-26
macapps-apple[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-05-23
2025-05-24
macapp-apple[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-05-13
2025-05-23

Appendix H: Cluster 5 — macOS Storage Cleaning Indicators

Indicator
IP Address
ASN
First Seen
Last Seen
mac-os-helper[.]com
Cloudflare
Cloudflare
2026-02-07
2026-03-05
stormac[.]it[.]com
Cloudflare
Cloudflare
2026-02-20
2026-02-20
macos-storageperf[.]com
Cloudflare
Cloudflare
2026-02-06
2026-03-05
apple[.]assistance-tools[.]com
Cloudflare
Cloudflare
2026-01-25
2026-01-25
apple[.]diagnostic[.]wiki
Cloudflare
Cloudflare
2026-01-24
2026-01-30
macintosh-hub[.]com
Cloudflare
Cloudflare
2025-12-02
2026-03-05

Appendix I: MITRE ATT&CK Techniques

Tactic: Technique
ATT&CK Code
Initial Access: Phishing
T1566
Initial Access: Phishing: Spearphishing Link
T1566.002
Execution: Command and Scripting Interpreter
T1059
Execution: Command and Scripting Interpreter: PowerShell
T1059.001
Execution: Command and Scripting Interpreter: Unix Shell
T1059.004
Execution: User Execution
T1204
Execution: User Execution: Malicious Link
T1204.001
Execution: User Execution: Malicious File
T1204.002
Defense Evasion: Obfuscated/Compressed Files or Information
T1027
Defense Evasion: Obfuscated/Compressed Files or Information: Software Packing
T1027.002
Defense Evasion: Obfuscated/Compressed Files or Information: Command Obfuscation
T1027.010
Defense Evasion: Deobfuscate/Decode Files or Information
T1140
Defense Evasion: System Binary Proxy Execution
T1218
Persistence: Boot or Logon Autostart Execution
T1547
Persistence: Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
T1547.001
Persistence: Boot or Logon Autostart Execution: Shortcut Modification
T1547.009
Command-and-Control: Application Layer Protocol
T1071
Command-and-Control: Application Layer Protocol: Web Protocols
T1071.001
Command-and-Control: Ingress Tool Transfer
T1105
Discovery: System Information Discovery
T1082