Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts

November 23, 2025

Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data

November 23, 2025

Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain

November 23, 2025
Facebook X (Twitter) Instagram
Sunday, November 23
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Cybercriminals Exploit Browser Push Notifications to Deliver Malware
News

Cybercriminals Exploit Browser Push Notifications to Deliver Malware

Team-CWDBy Team-CWDNovember 21, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Cybercriminals are delivering malware via web browser features using a newly discovered command-and-control (C2) platform dubbed Matrix Push C2.

The malicious C2 platform, discovered by BlackFrog, tricks users with fake system notifications, redirecting them to malicious sites, monitoring infected clients in real time, and even scanning for cryptocurrency wallets.

In a report published on November 20, BlackFrog outlined how Matrix Push C2 abuses the legitimate web browser push notification system as a C2 channel.

Matrix Push C2 works by first tricking users into allowing browser notifications, often via social engineering on malicious or compromised websites. Once a user is subscribed to the attacker’s notifications a direct line to that user’s desktop or mobile device is created via the browser.

The cybercriminals then push out legitimate-looking error messages and security alerts that appear as if they are from the operating system or trusted software.

However, if a victim clicks on these fake notifications, they are taken to a site run by the attack, often a phishing page or a malware download.

BlackFrog described this attack as ‘fileless’ because the interaction is happening through the browser’s notifications system, therefore there is no need for a traditional malware file to be present on the system initially.

Matrix Push C2 Platform Details

The attack is orchestrated via a web-based dashboard provided by the Matrix Push C2 platform. 

The threat is not limited to a single operating system (Windows, Mac, Linux, Android, etc.) because it operates through standard browser technology, noted BlackFrog.

The campaign dashboard, which is part of Matrix Push C2, shows an active client panel. This gives the attacker detailed information on each victim in real time.

“This real-time intelligence is part of what makes Matrix Push C2 so dangerous. The attacker isn’t firing blind phishing emails hoping someone clicks, they have a live connection to the victim’s browser,” said BlackFrog.

Matrix Push C2 also includes analytics and link management tools so the attacker can measure how effective their campaign is and adjust tactics.

For the social engineering element of the attack, Matrix Push C2 comes with configurable templates to maximize the credibility of its fake messages.

“In the settings, we found templates for brands such as MetaMask, Netflix, Cloudflare, PayPal, TikTok and more, each designed to look like a legitimate notification or security page from those providers,” the BlackFrog report noted.

Further, the attacker can generate short, innocuous URLs (under a path they control) that redirect to the real malicious site. This helps evade filters and lowers victims’ skepticism that comes with sending long, suspicious-looking links.

To counter this threat, BlackFrog recommended using anti data exfiltration (ADX) technology, focused on blocking outbound traffic.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGoogle Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform
Next Article Over 67,000 Fake npm Packages Flood Registry in Worm-Like Spam Attack
Team-CWD
  • Website

Related Posts

News

Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts

November 23, 2025
News

Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data

November 23, 2025
News

Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain

November 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Don’t let “back to school” become “back to bullying”

September 11, 2025

How chatbots can help spread scams

October 14, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.