Researchers at Huntress have uncovered an inventive malware campaign named "CrashFix," orchestrated by a threat group they call KongTuke. The attack uses a malicious Google Chrome extension, "NexShield," which masquerades as a popular ad blocker. The extension deliberately causes the browser to crash and then displays a fake error message. This message socially engineers the user into executing a PowerShell command, which it has covertly copied to their clipboard. This action leads to the installation of a new Python-based RAT, ModeloRAT, with a focus on targeting corporate environments.
The CrashFix campaign is a multi-stage attack that cleverly blends technical manipulation with social engineering. It was distributed via the official Chrome Web Store, highlighting the ongoing challenge of keeping malicious extensions out of trusted marketplaces. The attack's focus on systems joined to a corporate domain suggests its goal is corporate espionage or initial access for larger attacks, such as ransomware.
The attack chain is highly structured:
T1176 - Browser Extensions).Alarms API to evade immediate detection. It then initiates a local denial-of-service attack by creating an endless loop of port connections, causing the browser to crash (T1499 - Endpoint Denial of Service).T1115 - Clipboard Data). The user is instructed to paste and run this command in the Windows Run dialog to "fix" the issue (T1204.002 - Malicious File).Finger.exe, to connect to a remote server (nexsnield[.]com) and retrieve the next stage payload (T1218 - System Binary Proxy Execution).A successful infection results in the installation of a remote access trojan, giving the KongTuke group full control over the victim's machine. As the attack targets domain-joined systems, this provides a critical foothold within a corporate network. From here, attackers can steal data, harvest credentials for Active Directory, move laterally to other systems, and deploy further malware like ransomware. The novel use of a browser crash as a social engineering lure is particularly effective, as users are more likely to trust instructions that appear to be part of a legitimate troubleshooting process.
| Type | Value | Description |
|---|---|---|
| domain | nexsnield[.]com |
C2 server used to host the secondary payload. |
| malware | ModeloRAT | The final Python-based RAT payload. |
| threat_actor | KongTuke | The threat group attributed with this campaign. |
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| process_name | finger.exe |
This legacy Windows utility is rarely used. Its execution, especially making an outbound network connection, is highly suspicious. | EDR logs, Windows Event ID 4688 | high |
| command_line_pattern | powershell.exe -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden |
Common PowerShell execution pattern to run scripts without user interaction or security warnings. | EDR command line logging | medium |
| file_name | NexShield – Advanced Web Protection |
The name of the malicious Chrome extension. | Browser extension inventory, security audits | high |
finger.exe. An EDR rule that alerts on finger.exe making any network connection would be a high-fidelity indicator for this attack.D3-UBA): Analyze user behavior for anomalies, such as a user pasting a long, obfuscated command into a Run or PowerShell prompt shortly after a browser crash.finger.exe.Use enterprise browser management to restrict users from installing unapproved browser extensions.
Train users to recognize social engineering and to never run commands provided by unexpected pop-ups or error messages.
Use application control to block the execution of legacy or non-essential binaries like finger.exe.
The CrashFix campaign's reliance on the legacy finger.exe binary presents a clear opportunity for mitigation. Implement an application allowlisting policy using a tool like AppLocker or WDAC to block the execution of finger.exe across all workstations. Since this tool has no modern business use, blocking it is a safe and highly effective way to break the attack chain. This prevents the PowerShell stager from downloading the final ModeloRAT payload, neutralizing the threat even if a user is tricked by the social engineering lure.
Use Google Chrome's enterprise management capabilities (or similar features in other browsers) to enforce a strict policy on browser extensions. Create an explicit allowlist of only the extensions required for business operations and configure the policy to block the installation of all others. This prevents the malicious 'NexShield' extension from being installed in the first place. This is a proactive measure that hardens the attack surface of the browser, which is a primary entry vector for many modern threats.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats