OneClik Attack: How ClickOnce is Fueling Cyber Shenanigans in Energy Sectors

OneClik takes advantage of Microsoft’s ClickOnce technology to stealthily infiltrate energy sectors. Leveraging Golang backdoors, this campaign cleverly hides in plain sight, using Amazon Web Services as its disguise. It’s a classic tale of digital espionage, where even the most mundane software tools become secret agents in a cyber whodunit.

Pro Dashboard

Hot Take:

Who knew Microsoft’s ClickOnce technology could be the star of a cyber thriller? OneClik is like the Swiss Army knife of cyber espionage, blending into corporate environments like a chameleon at a disco. It’s as if these threat actors are playing a game of hide and seek, but instead of “ready or not, here I come,” it’s more like “ready or not, here comes RunnerBeacon!” The energy sector won’t know what hit it—until it checks its emails, that is.

Key Points:

– OneClik campaign exploits Microsoft’s ClickOnce to target the energy, oil, and gas sectors.
– The attack uses a .NET-based loader, OneClikNet, to deploy a Go-based backdoor, RunnerBeacon.
– Communication with C2 servers is cleverly obscured using AWS cloud services.
– AppDomainManager injection and anti-analysis features make detection a game of Where’s Waldo.
– Chinese threat actors are suspected, but the jury’s still out on a definitive culprit.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?