Wednesday, May 7, 2025
HomeComputer SecurityCeidPageLock Malware that Monitors User's Browsing Data and Redirects Fake Pages

CeidPageLock Malware that Monitors User’s Browsing Data and Redirects Fake Pages

Published on

SIEM as a Service

Follow Us on Google News

CeidPageLock RootKit evolves again with more improved features, this times it has been distributed by the RIG Exploit kit. The latest version contains functionalities such as monitoring user browsing activities, replace websites with fake pages and ability to redirect victims to fake pages.

The CeidPageLock is a browser hijacker which manipulates the victim’s browser and turns their homepage site appears to be 2345.com – a Chinese web directory.

CeidPageLock
Fake page

Researchers from checkpoint observed the malware is particularly targeting Chinese victims, in particular, it uses various hijacking tricks to gather user data such as websites user’s visiting and the time spent on the site.

- Advertisement - Google News
CeidPageLock

CeidPageLock Malware Dropper

The dropper was signed with an expired Thawte Code Signing certificate and its main function is to extract the driver that reside’s with it. Once the driver executed it send’s the infected system details to the C&C server.

Threat actors made the driver stealthy to evade endpoint’s and its main function is to connect with the C&C hard-coded domains to download the encrypted homepage configuration that used to tamper the browser.

The hijacked homepage is 111[.]l2345[.]cn and it pretends to be 2345.com and it gathers victims stats on each and every search query and makes a profit by redirecting the victims to search engines that share ad revenue.

The rootkit uses AfdFastIoDeviceControl method to check every outgoing HTTP message to see if it matches to certain strings if it matches the rootkit adds the process to a redirected processes list.

CeidPageLock

The rootkit uses to check for every to find it is associated with recv() method. If it presents it modifies the webpage contents of the fake page that hosted in 111[.]l2345[.]cn.

when compared to the first version the new version adds VMProtect which adds protection against reversing and cracking which makes the unpacking and analysis difficult.

According to 360 safe security analysis, the CEIDPageLock blocks browser files from accessing anti-virus files and the new version add’s a number of files to it.

“CEIDPageLock might seem merely bothersome and hardly dangerous, the ability to execute code on an infected device while operating from the kernel, coupled with the persistence of the malware, makes it a potentially perfect backdoor.” researchers said.

IOCs:

www[.]tj999[.]top
42.51.223.86
118.193.211.11

MD5:

C7A5241567B504F2DF18D085A4DDE559 – packed dropper
F7CAF6B189466895D0508EEB8FC25948 – houzi.sys
1A179E3A93BF3B59738CBE7BB25F72AB – unpacked dropper

Also Read

Multiple Malware Campaigns Distributing Remcos RAT Via Malicious Excel and Word Documents

AdvisorsBot Malware Attack on Hotels, Restaurants, and Telecommunications Via Weaponized Word Document

Lazarus APT Group Attack Cryptocurrency Exchange using macOS Malware Under the Operation AppleJeus

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

NSO Group Ordered to Pay $168 Million to WhatsApp in US Spyware Verdict

A federal jury in California has ordered Israeli spyware maker NSO Group to pay...

BFDOOR Malware Targets Organizations to Establish Long-Term Persistence

The BPFDoor malware has emerged as a significant threat targeting domestic and international organizations,...

Uncovering the Security Risks of Data Exposure in AI-Powered Tools like Snowflake’s CORTEX

As artificial intelligence continues to reshape the technological landscape, tools like Snowflake’s CORTEX Search...

UNC3944 Hackers Shift from SIM Swapping to Ransomware and Data Extortion

UNC3944, a financially-motivated threat actor also linked to the group known as Scattered Spider,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

BFDOOR Malware Targets Organizations to Establish Long-Term Persistence

The BPFDoor malware has emerged as a significant threat targeting domestic and international organizations,...

Over 2,800 Hacked Websites Targeting MacOS Users with AMOS Stealer Malware

Cybersecurity researcher has uncovered a massive malware campaign targeting MacOS users through approximately 2,800...

Hackers Target HR Departments With Fake Resumes to Spread More_eggs Malware

The financially motivated threat group Venom Spider, also tracked as TA4557, has shifted its...