In the world of digital allure, OnlyFans has become an enticing brand not just for eager users, but also for clever cyber attackers. The CRPx0 malware campaign is the latest threat to exploit this popular platform, targeting macOS, Windows, and potentially even Linux users. The sophisticated malware aims to steal cryptocurrencies, exfiltrate data, and deploy ransomware in a stealthy and persistent manner.
Aryaka Threat Research Labs has thoroughly examined this campaign, revealing that it all starts with a tempting offer: a free OnlyFans account. Users on the hunt for unauthorized access might come across an intriguing file named OnlyfansAccounts.zip. It’s a classic case of social engineering, where the desire for free content leads users down a risky path.
“This attack is a highly organized, multi-platform threat that targets Windows and macOS, with potential support for Linux,” summarizes Aryaka.
The deceptive zip file contains a shortcut labeled Onlyfans Accounts.lnk, which seems like the logical next step for those seeking a free account. But behind this façade lies a malicious payload. The file offers what appears to be login credentials, but as soon as it’s opened, the CRPx0 malware starts its dirty work.
The attackers gain control through their command and control (C2) infrastructure, allowing the malware to gather system information and maintain its presence. It even updates itself to ensure it remains effective. This three-phase attack focuses on cryptocurrency theft, data exfiltration, and ultimately, ransomware deployment.
The malware’s first trick is monitoring the clipboard for wallet addresses. When a victim copies a wallet address, the malware swaps it with the attackers’ own, diverting cryptocurrency transactions into their pockets.
Next, the cybercriminals identify valuable data to steal, targeting documents, media, emails, and more. This pilfered information sets the stage for the final blow – ransomware.
When ready, the malware downloads an encryption payload, encrypting selected files and demanding ransom. Victims find their screens displaying a ransom note, urging them to contact the attackers via various channels.
The CRPx0 campaign is not picky about its victims. Anyone seeking free OnlyFans access could be targeted, with ransom notes popping up in English, Russian, and Chinese. The campaign’s leaks site boasts 38 victims, offering stolen data for a one-time fee.
Aryaka’s investigation provides a detailed look at the campaign’s tactics, techniques, and procedures, including a mapping to MITRE ATT&CK, helping cybersecurity experts understand and combat this formidable threat.