Cybersecurity firm Moonlock Lab has uncovered a highly deceptive new crypto-stealing campaign. Hackers are using a technique called "ClickFix" to bypass security systems by tricking victims into executing the malware themselves.
🔹 The Fake VC Trap: Scammers are posing as venture capitalists (like SolidBit, MegaBit, and Lumax Capital) on LinkedIn. They send malicious Zoom or Google Meet links that redirect to a fake Cloudflare "I am not a robot" page. Clicking the box copies a malicious script to your clipboard, and the site then tricks you into pasting it into your terminal.
🔹 The Hijacked Extension: Attackers also took over the "QuickLens" Chrome extension (~7,000 users). The compromised version actively hunts for your crypto wallets, seed phrases, Gmail inbox data, and saved passwords.
🔹 How to Protect Yourself: QuickLens has been permanently removed from the Chrome Web Store. If you still have it installed, delete it immediately. Most importantly: Never paste unknown code into your computer's terminal!
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
🚨 Critical Security Alert: "ClickFix" Hackers Hijack Chrome Extensions & Impersonate VCs! 🛡️
Cybersecurity firm Moonlock Lab has uncovered a highly deceptive new crypto-stealing campaign. Hackers are using a technique called "ClickFix" to bypass security systems by tricking victims into executing the malware themselves.
🔹 The Fake VC Trap: Scammers are posing as venture capitalists (like SolidBit, MegaBit, and Lumax Capital) on LinkedIn. They send malicious Zoom or Google Meet links that redirect to a fake Cloudflare "I am not a robot" page. Clicking the box copies a malicious script to your clipboard, and the site then tricks you into pasting it into your terminal.
🔹 The Hijacked Extension: Attackers also took over the "QuickLens" Chrome extension (~7,000 users). The compromised version actively hunts for your crypto wallets, seed phrases, Gmail inbox data, and saved passwords.
🔹 How to Protect Yourself: QuickLens has been permanently removed from the Chrome Web Store. If you still have it installed, delete it immediately. Most importantly: Never paste unknown code into your computer's terminal!