OneClik Malware Hides In Plain Sight

cyberattack malware

A New Breed of Cyber Intrusion

Cybersecurity experts have uncovered a highly targeted malware campaign known as OneClik. This operation is not your typical scattergun attack—it's a focused effort aimed squarely at high-value industries such as energy, oil, and gas. What makes OneClik noteworthy is its use of Microsoft's ClickOnce technology, a legitimate tool designed to make software deployment seamless for users. Instead, attackers have flipped it into a weapon for quietly delivering backdoors into critical systems.

Living Off the Land: The Attackers’ Evasive Strategy

Rather than relying on noisy malware that triggers alarms, OneClik takes a subtler approach. The campaign aligns with a broader industry trend known as "living-off-the-land" techniques—using trusted system tools and platforms to operate undetected. The attackers blend malicious processes into normal enterprise workflows, making detection extremely difficult. Though some characteristics suggest links to Chinese-affiliated threat groups, security analysts remain cautious about assigning blame.

From Phishing to Full Control

The attack chain begins with a deceptively simple phishing email. Victims are redirected to a fake website that mimics a legitimate hardware analysis tool. When visited, this site silently delivers a ClickOnce application. While this might seem harmless, the application is actually a .NET-based loader that triggers a complex chain of events. At the center of this chain is a powerful backdoor known as RunnerBeacon.

RunnerBeacon: The Core Implant

Built using the Go programming language, RunnerBeacon is designed for stealth and versatility. It communicates with its operators using various protocols, including HTTPS, raw TCP, and even Windows-named pipes. This allows the malware to carry out a wide range of activities: reading and modifying files, scanning internal networks, executing shell commands, stealing tokens for privilege escalation, and moving laterally through the network. It's not just a foothold—it's a toolkit for deep system compromise.

No Admin Rights Required: Why ClickOnce Matters

One of the campaign's cleverest tricks lies in its abuse of ClickOnce. This Microsoft technology is typically used to install software without needing administrator privileges. Attackers leverage this to launch their malware without raising red flags or asking for suspicious permissions. The malicious app runs through a trusted Windows process, dfsvc.exe, and employs a rarely seen tactic known as AppDomainManager injection to execute encrypted shellcode in memory—making forensic recovery difficult.

Not a One-Off: Evolving Variants in the Wild

This isn't a single strain of malware—it's a growing family. Security researchers have identified several OneClik variants emerging in 2025 alone, each version more refined than the last. Names like v1a, BPI-MDM, and v1d indicate a maturing toolset designed for evasion and persistence. In fact, earlier sightings of the RunnerBeacon backdoor trace back to 2023, pointing to a campaign that has been operating and evolving quietly over time.

Broader Implications: What This Means for Businesses

The implications of OneClik's activity are significant. Its ability to fly under the radar, avoid privilege escalation requirements, and operate within trusted systems makes it especially dangerous for industries relying on legacy systems or minimal endpoint protections. Traditional antivirus tools and firewalls may not catch it. Organizations in infrastructure sectors must consider whether their current defenses can cope with this type of attack.

Here are some key signs that could suggest a OneClik-style intrusion:

  • Unusual outbound traffic to AWS or other cloud services
  • Unknown child processes of dfsvc.exe
  • Use of AppDomainManager or suspicious .NET assemblies
  • Gradual privilege escalations without alerts

A Global Pattern: Connections to Other Threat Actors

While attribution remains murky, researchers have noted similarities between OneClik's techniques and those used by state-linked groups in Northeast Asia. One campaign by a group known as APT-Q-14 also leveraged ClickOnce applications, this time exploiting a zero-day XSS flaw in a web-based email service to install malware without any clicks at all. The overlap in tactics suggests either shared tooling or a common playbook among regional threat actors.

Adaptability Is the New Weapon

What sets OneClik apart from traditional malware is its flexibility. It doesn't rely on blockbuster vulnerabilities or brute-force methods. Instead, it adapts. It uses trusted platforms like AWS, cloaks its communications, and evolves in real-time. This is emblematic of a wider shift in cyber threats: away from volume and toward stealth and precision.

Final Thoughts

The OneClik campaign is a clear reminder that even legitimate technologies can be repurposed for malicious ends. For security teams, this means looking beyond surface-level protections and investing in behavioral analysis, anomaly detection, and advanced monitoring. As threat actors don't stop refining their methods, defenders must match them in agility and insight. The future of cybersecurity lies in understanding not just what attackers do—but how quietly they do it.

June 27, 2025
Loading...

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.