ClickOnce Chaos: How Hackers Are Turning Microsoft Tools into Mischief Makers!
Hackers are causing chaos in the energy sector with OneClik, a campaign using Microsoft’s ClickOnce tool. By cleverly disguising malware as legitimate applications, they’re sneakily infiltrating systems. The use of AWS services keeps their activities hidden, making it feel like they’re playing hide-and-seek in the cloud!

Hot Take:
Who knew Microsoft’s ClickOnce could be the Trojan horse of the digital age? It’s like hackers went on a software shopping spree and picked the least suspected tool to unleash their cyber mischief. OneClik: when hackers play the long game of hide-and-seek using AWS as a very effective hiding spot. If only they put this much effort into something constructive, like building a real-life invisibility cloak!
Key Points:
- OneClik uses Microsoft’s ClickOnce tool to deploy malicious software in energy, oil, and gas sectors.
- Hackers leverage AWS services to keep their command and control (C2) infrastructure under wraps.
- The campaign involves a Golang backdoor called RunnerBeacon and uses .NET-based loaders.
- Techniques include AppDomainManager injection and cloud-based staging to stay stealthy.
- Though methods resemble those of China-affiliated actors, attribution remains cautious.
Already a member? Log in here