Hacker trap: Fake OnlyFans tool backstabs cybercriminals, steals passwords

Summary: Hackers are now targeting fellow cybercriminals with a deceptive OnlyFans tool that claims to assist in account theft but instead infects them with the Lumma stealer malware. This incident highlights the ironic and treacherous nature of cybercrime, where attackers can easily become victims of their own schemes.

Threat Actor: Unknown | Lumma stealer
Victim: Cybercriminals | hackers

Key Point :

  • Hackers are using a fake OnlyFans checker tool to lure other cybercriminals into downloading the Lumma malware.
  • Lumma is a sophisticated information-stealing malware that can exfiltrate sensitive data such as passwords and cryptocurrency wallets.
  • The campaign also utilizes a GitHub repository to distribute malicious payloads disguised as legitimate tools for various platforms.
  • This incident exemplifies the ongoing trend of cybercriminals targeting each other in a dangerous game of deception.

OnlyFans

Hackers are targeting other hackers with a fake OnlyFans tool that claims to help steal accounts but instead infects threat actors with the Lumma stealer information-stealing malware.

The operation, discovered by Veriti Research, constitutes a characteristic example of the blurred lines between being a predator or prey in the world of cybercrime, where ironic twists and backstabs are abundant.

“Checking” into a Lumma infection

OnlyFans is an extremely popular subscription-based adult content platform where creators can earn money from users (referred to as “fans”) who pay for access to their content.

Creators can share videos, images, messages, and live streams with their subscribers, while subscribers pay a recurring fee or one-time payments for exclusive content.

Given its popularity, OnlyFans accounts often become targets of threat actors who attempt to hijack them to steal fan payments, extort the account owner to pay a ransom, or simply leak private photos.

Checker tools are designed to help validate large sets of stolen login credentials (usernames and passwords), checking if the login details match any OnlyFans accounts and whether they’re still valid.

Without those tools, cybercriminals would have to manually test out thousands of credential pairs, an impractical and tedious process that would render the scheme nonviable.

However, these tools are commonly created by other cybercriminals, causing hackers to trust that they are safe to use, and in some cases, this backfires.

Veriti discovered a case of an OnlyFans checker promising to verify credentials, check account balances, verify payment methods, and determine creator privileges but instead installed the Lumma information-stealing malware.

Threat actor's checker ad on a hacker forum
Threat actor’s checker ad on a hacker forum
Source: Veriti

The payload, named “brtjgjsefd.exe,” is fetched from a GitHub repository and loaded into the victim’s computer.

Lumma is an information-stealing malware-as-a-service (MaaS) that has been rented to cybercriminals since 2022 for $250-$1000/month and distributed via various means, including malvertising, YouTube comments, torrents, and, more recently, GitHub comments.

It is an advanced information stealer with innovative evasion mechanisms and the ability to restore expired Google session tokens. It is mostly known for stealing two-factor authentication codes, cryptocurrency wallets, and passwords, cookies, and credit cards stored on a victim’s browser and file system.

Lumma also doubles as a loader itself, capable of introducing additional payloads onto the compromised system and executing PowerShell scripts.

A broader deception operation

Veriti found that when the Lumma Stealer payload is launched, it will connect to a GitHub account under the name “UserBesty,” which the cybercriminal behind this campaign uses to host other malicious payloads.

Malicious GitHub repository
Malicious GitHub repository
Source: Veriti

Specifically, the GitHub repository contains executables that resemble checkers for Disney+ accounts, Instagram, and a supposed Mirai botnet builder:

  • Disney+ account thieves are targeted with “DisneyChecker.exe”
  • Instagram hackers are lured by “InstaCheck.exe”
  • Wannabe botnet creators are lured with “ccMirai.exe”

Digging deeper into the malware’s communications, Veriti’s researchers found a set of “.shop” domains that acted as command and control (C2) servers, sending commands to Lumma and receiving the exfiltrated data.

This campaign is not the first time threat actors have targeted other cybercriminals in malicious attacks.

In March 2022, hackers targeted hackers with clipboard stealers disguised as cracked RATs and malware-building tools to steal cryptocurrency.

Later that year, a malware developer backdoored their own malware to steal credentials, cryptocurrency wallets, and VPN account data from other hackers.

Source: https://www.bleepingcomputer.com/news/security/fake-onlyfans-cybercrime-tool-infects-hackers-with-malware