Fake Meta “Account Suspension” Emails Deliver StealC Malware via FileFix Phishing Campaign

Sep 19, 2025

Quick Take

  • Threat Actor Tactic: FileFix (ClickFix variant) campaign distributing StealC info-stealer.

  • Impact: Theft of credentials, authentication cookies, VPN logins, crypto-wallet data, and desktop screenshots.

  • Delivery Vector: Phishing emails impersonating Meta (Facebook/Instagram), redirecting victims to fraudulent support pages that instruct them to paste malicious commands into the File Explorer address bar.

  • Significance: Represents an evolution in phishing — moving beyond link-clicks and attachments to command execution via social engineering, bypassing traditional awareness filters.

The Campaign

Security researchers have identified a coordinated phishing operation masquerading as Meta “suspension” alerts. The emails warn recipients that their Facebook or Instagram account will be deactivated unless they review an alleged violation report.

Clicking the link redirects victims to a counterfeit Meta support portal. Instead of delivering a malicious attachment or drive-by download, the portal instructs users to copy a file path/command into the Windows File Explorer address bar.

This novel abuse, dubbed FileFix, is a derivative of the ClickFix technique. The seemingly harmless file-path execution conceals a PowerShell command, which silently downloads and executes the StealC info-stealer.

Payload Analysis

StealC is a modular infostealer capable of harvesting:

  • Saved browser passwords and session cookies, enabling full account takeover.

  • VPN credentials, exposing organisations to secondary intrusions.

  • Cryptocurrency wallets and keys, allowing direct financial theft.

  • Desktop screenshots and other artifacts useful for fraud and lateral movement.

Unlike commodity malware, StealC is designed to quickly monetise stolen assets while providing attackers with persistence inside both personal and corporate ecosystems.

Why This Matters

This campaign highlights two critical shifts:

  1. User Interface Exploitation: By exploiting the File Explorer address bar, attackers bypass conventional user suspicion. Victims feel they are completing a routine support step rather than executing malicious code.

  2. Credential-Centric Attacks: Modern infostealers like StealC don’t just compromise one account — they compromise an entire digital identity, from social media to banking, enterprise logins, and crypto wallets.

For organisations, this means a single compromised endpoint can rapidly escalate into enterprise-wide breaches.

Defensive Guidance

For Enterprises

  • Phishing resilience: Flag, quarantine, and report Meta-themed “suspension” emails. Block identified domains and URLs.

  • Execution controls: Restrict PowerShell usage through AppLocker or Windows Defender Application Control. Monitor for unusual process chains triggered by explorer.exe.

  • Credential hygiene: Enforce hardware MFA, limit persistent sessions, and rotate shared credentials.

  • Detection & response: Ensure EDR coverage includes telemetry for File Explorer address-bar execution events.

  • Awareness training: Update phishing simulations to cover advanced lures (e.g., “paste this into File Explorer”), stressing that legitimate platforms never ask users to paste commands.

For Individuals

  • Do not trust unsolicited “suspension” or “security review” requests — especially those instructing command execution.

  • Enable two-factor authentication on all key accounts.

  • Use a password manager to avoid password reuse.

  • Keep OS, browsers, and security software updated.

Looking ahead

FileFix demonstrates how phishing is evolving into micro-interaction exploits, where attackers weaponise small, plausible instructions rather than obvious malware files.

Security teams should expect variants across languages and platforms, with the File Explorer trick likely being adapted into other user workflows. Future phishing campaigns may replicate this pattern at scale, targeting enterprise environments where session hijacking and VPN credential theft can yield maximum impact.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack
Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack
Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack
Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Feb 19, 2026

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks
Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks
Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks
Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Feb 17, 2026

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown
Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown
Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown
Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Feb 13, 2026

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails
Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails
Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails
Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Feb 13, 2026

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers
China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers
China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers
China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

Feb 11, 2026

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery
Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery
Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery
Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Feb 9, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.