CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures

Parkinsond

Level 62
Thread author
Verified
Well-known
Dec 6, 2023
5,052
14,229
6,069
In the attack chain documented by the cybersecurity company, the victim is said to have searched for an ad blocker when they were served a malicious advertisement that redirected them to an extension hosted on the Official Chrome Web Store.

The browser extension in question, "NexShield – Advanced Web Guardian" (ID: cpcdkmjddocikjdkbbeiaafnpdbdafmi), masquerades as the "ultimate privacy shield" and claims to protect users against ads, trackers, malware, and intrusive content on web pages. It was downloaded at least 5,000 times. It's currently no longer available for download.

The extension, per Huntress, is a near-identical clone of uBlock Origin Lite version 2025.1116.1841, a legitimate ad blocker add-on available for all major web browsers. It's engineered to display a fake security warning, claiming the browser had "stopped abnormally" and prompting users to run a "scan" to remediate a potential security threat detected by Microsoft Edge.

edges.jpg


Should the user opt to run the scan, the victim is presented with a bogus security alert that instructs them to open the Windows Run dialog and paste the displayed command already copied to the clipboard, and execute it. This, in turn, causes the browser to completely freeze, crashing it by launching a denial-of-service (DoS) attack that creates new runtime port connections through an infinite loop that triggers one billion iterations of the same step repeatedly.
This resource exhaustion technique results in excessive memory consumption, causing the web browser to become slow, unresponsive, and eventually crash.

"The pop-up only appears on browser startup after the browser becomes unresponsive," researchers Anna Pham, Tanner Filip, and Dani Lopez said. "Before the DoS executes, a timestamp is stored in local storage. When the user force-quits and restarts their browser, the startup handler checks for this timestamp, and if it exists, the CrashFix popup appears, and the timestamp is removed."

 
Indicators of Compromise (IOCs)
Configure your SIEM or EDR to hunt for the following indicators based on the analyzed reports.

Files & Extensions

Extension Name

NexShield – Advanced Web Guardian

Extension ID
cpcdkmjddocikjdkbbeiaafnpdbdafmi

Impersonated Product
uBlock Origin Lite (v2025.1116.1841)

Network Indicators (Refanged)

nexsnield[.]com (C2 / Tracker)

199.217.98[.]108 (Payload Delivery via Finger)

170.168.103[.]208 (ModeloRAT C2)

158.247.252[.]178 (ModeloRAT C2)

Behavioral Indicators

High frequency of finger.exe execution spawning PowerShell.

Chrome/Edge processes consuming abnormal RAM/CPU (Resource Exhaustion).

PowerShell scripts checking for domain join status (flags ABCD111 or BCDA222).

Remediation & Defense
If you suspect infection, standard extension removal is insufficient due to the potential deployment of ModeloRAT.

Isolate the Host
Immediately disconnect the device from the corporate network.

Hunt for Persistence
Check Windows Registry Run keys for Python scripts or PowerShell commands.

Review Scheduled Tasks created roughly 60 minutes after the browser extension installation.

Browser Cleansing
Remove the malicious extension cpcdkmjddocikjdkbbeiaafnpdbdafmi.

Clear Local Storage and browser cache to remove the "crash loop" timestamp triggers.

Network Block
Blacklist the IPs listed in Section 3 at the firewall/DNS level.

References

MITRE ATT&CK T1218.013

System Binary Proxy Execution: Finger

MITRE ATT&CK T1204.002
User Execution: Malicious File

MITRE ATT&CK T1499
Endpoint Denial of Service (Browser Freeze)

NIST SP 800-61r2
Computer Security Incident Handling Guide (Identification & Containment)
 
Last edited:
  • Like
Reactions: harlan4096
It sounds like it was fairly short lived, hopefully the ~5,000 didn't fall victim to the prompt.
It was downloaded at least 5,000 times. It's currently no longer available for download.