Fake screenshot links used to infect Web3 support teams with multi-stage malware


A targeted malware campaign is hitting Web3 customer support staff through fake screenshot links sent in live chat conversations. Instead of exploiting a software flaw, the attackers pose as customers, send what looks like a harmless image link, and rely on the support agent to open a disguised executable that starts a multi-stage infection chain.

ZeroShadow says the activity is linked with moderate confidence to APT-Q-27, also known as GoldenEyeDog, a financially motivated group with a documented history of targeting gambling and cryptocurrency organizations. The firm says this campaign marks a shift from older watering-hole and trojanized software tactics toward direct social engineering of front-line support teams.

The campaign surfaced after 1inch flagged suspicious activity in its support queue. According to ZeroShadow, multiple requests arrived from different accounts and rotating IP addresses, but they all followed the same pattern: a short link presented as a screenshot from a confused customer asking for help with a transaction.

How the attack starts

The lure is simple. A support agent receives a link that appears to point to a screenshot and includes “Google”-style wording that helps it look familiar. Clicking it downloads a file whose name looks like an image. On many Windows systems, the real extension stays hidden by default, so the file can appear harmless even though it is actually executable.

ZeroShadow says the downloaded file uses the .pif format, an older Windows executable type that many users would not recognize as dangerous. When opened, it shows what looks like a broken webpage or failed image, while malware installation begins quietly in the background.

That approach matters because it targets routine support behavior. The attacker does not need a browser exploit or a software bug. The victim only needs to believe they are opening a screenshot from a customer.

What happens after execution

ZeroShadow says the first-stage lure reaches out to an AWS S3 bucket and retrieves a manifest file that contains URLs for the next payloads. That setup lets the attackers rotate infrastructure without changing the initial malware sample, which gives them flexibility if part of the operation gets blocked or reported.

The next package includes a legitimate signed binary from the YY platform called updat.exe, along with malicious DLLs. When the signed binary runs from the staging folder, Windows loads the attacker’s DLLs from the local directory first. This DLL sideloading step lets the malware execute under cover of a trusted file.

ZeroShadow says one malicious component reads an encrypted file named yyext.log, decrypts it in memory, and launches shellcode without dropping a final payload to disk. The shellcode then decompresses the final backdoor in memory, which reduces the file artifacts defenders would normally hunt for.

Lure File on Windows Desktop (Source – ZeroShadow)

Why this campaign stands out

This operation goes after a weak point that many companies overlook: human support workflows. Web3 firms often run live chat support for users dealing with transactions, wallets, or account issues. That creates an ideal opening for attackers who can convincingly pose as frustrated customers and slip in a fake screenshot.

The malware chain also shows planning. ZeroShadow describes a staged delivery model, AWS dead drops, DLL sideloading, in-memory execution, persistence, and defense-evasion changes. That is more advanced than a basic chat-borne downloader.

Attribution remains measured. ZeroShadow says it traced the tooling and infrastructure back to APT-Q-27 with moderate confidence, not absolute certainty. That distinction matters and should stay in the reporting.

Key technical details

ItemDetails
Threat groupAPT-Q-27 / GoldenEyeDog
Target profileWeb3 customer support staff
Initial lureFake screenshot link in live support chat
Initial file type.pif executable disguised as an image
Staging methodAWS S3 manifest and follow-on payload retrieval
Execution techniqueDLL sideloading via legitimate updat.exe
Final implant behaviorMemory-resident backdoor
C2 behavior37 hardcoded servers over TCP port 15628
PersistenceRegistry startup value SystemUpdats
Service name usedWindows Eventn

Source: ZeroShadow research.

Persistence and stealth tricks

ZeroShadow says the final implant communicates with 37 hardcoded command-and-control servers over TCP port 15628. It also registers itself as a Windows service named Windows Eventn, a misspelled name designed to blend into normal Windows service listings.

The researchers also say the malware disables User Account Control through three separate registry keys. In addition, the loader writes a registry startup value called SystemUpdats, another deliberate misspelling meant to look routine at a glance.

Full End-to-End Execution Flow (Source – ZeroShadow)

The staging directory reportedly imitates the Windows Update cache path, and each installation includes a hardcoded @27 tag in the directory name. ZeroShadow says that string can serve as a reliable hunting clue during incident response.

What defenders should do now

  • Enable visible file extensions on all Windows workstations so disguised .pif files stand out.
  • Block outbound traffic on TCP port 15628 where feasible and review connections to known campaign infrastructure.
  • Monitor for the registry value SystemUpdats and for unusual service creation tied to Windows Eventn.
  • Hunt for staging directories that mimic Windows Update paths and contain the @27 marker.
  • Alert on simultaneous changes to all three UAC-related registry keys, which ZeroShadow says no legitimate software should do in this pattern.
  • Train support teams to treat unsolicited screenshot links and “can you check this transaction?” chats as potential malware lures. This training recommendation is an inference from the campaign’s initial access method.

FAQ

Who is behind the fake screenshot malware campaign?

ZeroShadow links the activity with moderate confidence to APT-Q-27, also known as GoldenEyeDog, a financially motivated group that has targeted gambling and crypto-related organizations.

What file do victims receive?

Victims receive a file disguised as a screenshot, but ZeroShadow says it is actually a .pif executable. On Windows systems with hidden extensions, it can look like a normal image file.

What malware does the attack install?

The campaign delivers a multi-stage, memory-resident backdoor through AWS-hosted staging, DLL sideloading, and in-memory decryption and execution.

Why are Web3 support agents being targeted?

They regularly handle user complaints, transaction questions, and screenshot-based troubleshooting. That makes live chat support a strong social engineering entry point. This explanation follows from ZeroShadow’s description of how the campaign worked against 1inch support staff.

What are the clearest detection clues?

ZeroShadow highlights TCP port 15628 traffic, the Windows Eventn service name, the SystemUpdats registry value, UAC registry tampering, and staging paths with the @27 marker.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages