CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 12, 2026

Free OnlyFans Lure Used to Spread Cross-Platform CRPx0 Malware

Security Week Archived May 12, 2026 ✓ Full text saved

CRPx0 is a complex, stealthy malware campaign that targets macOS and Windows systems, and appears to have Linux capabilities in development. The post Free OnlyFans Lure Used to Spread Cross-Platform CRPx0 Malware appeared first on SecurityWeek .

Full text archived locally
✦ AI Summary · Claude Sonnet


    OnlyFans – an attractive brand for hopeful users and their attackers. CRPx0 is a complex, stealthy and persistent malware campaign. It currently targets macOS and Windows systems, and appears to have Linux capabilities in development. It currently comprises cryptocurrency theft followed by large scale data exfiltration and ransomware. The campaign has been analyzed (PDF) in detail by Aryaka Threat Research Labs. The initial social engineering lure is the offer of a free OnlyFans account. Users interested in free access to OnlyFans might actively search for available options, and stumble across the threat actors’ OnlyfansAccounts.zip. By looking for unauthorized free access to paid-for content, these users have already demonstrated a willingness to be risk takers open to less than legitimate activity. They would be more willing to download the zip, and to accept that acquiring a free account might require some non-standard activity. That’s a good start for any attacker. The malicious zip contains a shortcut file (Onlyfans Accounts.lnk) which would appear to be a legitimate next step in pursuing a non-legitimate purpose. There is no apparent reason for the risk taker not to proceed. The lnk provides a file that appears to contain the promised account credentials. It is titled Accounts.txt, has the headline ’50 working Onlyfans account’ and lists what appears to be credentials – but in the background, it begins to install the malware. The attackers maintain control from their C2 while the malware collects environment data and establishes persistence. The malware even calls home periodically to see if there is a newer version of itself, and updates itself as necessary. There are three primary effects of CRPx0 campaign: cryptocurrency theft, data exfiltration, and delivery of ransomware. The crypto theft is achieved by continuously monitoring the system clipboard. If the victim copies a wallet address (while sending or receiving funds), this is detected – and the address switched out for one controlled by the attackers. So, if users copy their wallet address to give to the sender (ready to receive the crypto), they actually instruct the sender to send the money to the threat actors who receive the crypto. The second phase of the campaign is data exfiltration – the first part of a double extortion process. The data to be stolen is selected by the attackers via the C2. It will correlate with the user data that is subsequently encrypted – such as documents, media and images, emails, developer and code files, and engineering and design files. Once this data has been stolen, the attackers move to the encryption phase. “When the malware receives the ‘encryption’ command,” explains the analysis, “it downloads the crypter.py payload from a remote server and saves it locally. Once the file is successfully written, it is executed using the system’s Python interpreter.” A unique key is generated using the Fernet mechanism for AES encryption and sent to the C2. The targeted files are read, encrypted and saved with the extension ‘.crpx0’. Specific system and critical directories are excluded to ensure the system remains stable despite the ransomware. The desktop wallpaper is exchanged for the attackers’ ‘gotcha’ image, and ransom instruction notes are dropped in English, Russian, and Chinese. Victims are instructed to contact the attackers through multiple channels (including email, qTox, and Telegram). The campaign maintains its own leaks site. At the time of writing, it claims 38 victims compromised so far, with 23 leaks available. It also claims to have stolen a massive 10,839 terabytes of data. The remaining 15 victims have either paid the ransom, or the deadline for payment has not yet expired. Where the stolen data is available, it is being offered for a one-time fee of $500 in cryptocurrency. This provides ‘Lifetime access to all current and future leaks’, with ‘No monthly recurring charges’. “This attack is a highly organized, multi-platform threat that targets Windows and macOS, with potential support for Linux,” summarizes Aryaka. “Its capabilities include cryptocurrency theft, wallet seed phrase harvesting, deploying additional malicious payloads, and full-scale ransomware encryption. The operation is modular and adaptable, allowing attackers to escalate from opportunistic theft to large-scale data exfiltration and double extortion.” There is no apparent targeting in this campaign. It could be any user looking for a free OnlyFans account (hence, perhaps, the ransom notes appearing in English, Russian and Chinese). However, victims are more likely to be using their own personal device in the first instance. Most employees would be aware that the security department can readily see where they are going on a company device while in the office. Aryaka’s write-up includes a list of IoCs, and a mapping to MITRE ATT&CK. Related: Ransomware Group Takes Credit for Trellix Hack Related: Iranian APT Intrusion Masquerades as Chaos Ransomware Attack Related: Two US Security Experts Sentenced to Prison for Helping Ransomware Gang Related: Sandhills Medical Says Ransomware Breach Affects 170,000 WRITTEN BY Kevin Townsend Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines. More from Kevin Townsend Build Application Firewalls Aim to Stop the Next Supply Chain Attack Claude Code OAuth Tokens Can Be Stolen Through Stealthy MCP Hijacking AI Coding Agents Could Fuel Next Supply Chain Crisis Hacker Conversations: Joey Melo on Hacking AI Anthropic Unveils Claude Security to Counter AI-Powered Exploit Surge AI Fuels ‘Industrial’ Cybercrime as Time-to-Exploit Shrinks to Hours Cyber Insurance Data Gives CISOs New Ammo for Budget Talks Sevii Launches Cyber Swarm Defense to Make Agentic AI Security Costs Predictable Latest News White Circle Raises $11 Million for AI Control Platform BWH Hotels Says Hackers Had Access to Reservation Data for 6 Months Deal Reached With Hackers to Delete Data Stolen From the Canvas Educational Platform West Pharmaceutical Services Hit by Disruptive Ransomware Attack Apple Patches Dozens of Vulnerabilities in macOS, iOS SAP Patches Critical S/4HANA, Commerce Vulnerabilities Claude Mythos Finds Only One Curl Vulnerability; Experts Divided on What It Really Means Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Trending Webinar: ROSI For CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection And Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the Move Malwarebytes has named Chung Ip as Chief Financial Officer. Semperis has appointed John Podboy as Chief Information Security Officer. Randy Menon has become Chief Product and Marketing Officer at One Identity. More People On The Move Expert Insights Is The SOC Obsolete, And We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents With Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense In The Age Of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win The Cyber War Without The Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) Flipboard Reddit Whatsapp Email
    💬 Team Notes
    Article Info
    Source
    Security Week
    Category
    ◇ Industry News & Leadership
    Published
    May 12, 2026
    Archived
    May 12, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗