OneClik Attack: How ClickOnce is Fueling Cyber Shenanigans in Energy Sectors
OneClik takes advantage of Microsoft’s ClickOnce technology to stealthily infiltrate energy sectors. Leveraging Golang backdoors, this campaign cleverly hides in plain sight, using Amazon Web Services as its disguise. It’s a classic tale of digital espionage, where even the most mundane software tools become secret agents in a cyber whodunit.

Hot Take:
Who knew Microsoft’s ClickOnce technology could be the star of a cyber thriller? OneClik is like the Swiss Army knife of cyber espionage, blending into corporate environments like a chameleon at a disco. It’s as if these threat actors are playing a game of hide and seek, but instead of “ready or not, here I come,” it’s more like “ready or not, here comes RunnerBeacon!” The energy sector won’t know what hit it—until it checks its emails, that is.
Key Points:
– OneClik campaign exploits Microsoft’s ClickOnce to target the energy, oil, and gas sectors.
– The attack uses a .NET-based loader, OneClikNet, to deploy a Go-based backdoor, RunnerBeacon.
– Communication with C2 servers is cleverly obscured using AWS cloud services.
– AppDomainManager injection and anti-analysis features make detection a game of Where’s Waldo.
– Chinese threat actors are suspected, but the jury’s still out on a definitive culprit.