[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f52o_sC24mKzRJI8sAW9QUeLWj43NfVVliPLUhS9MCzg":3},{"article":4,"iocs":45},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":29,"category":30,"article_tags":34},"36510572-f9d4-4f97-9ccb-b2ff7826fa20","Free OnlyFans Lure Used to Spread Cross-Platform CRPx0 Malware","free-onlyfans-lure-used-to-spread-cross-platform-crpx0-malware-01328c","CRPx0 is a complex, stealthy malware campaign that targets macOS and Windows systems, and appears to have Linux capabilities in development. The post Free OnlyFans Lure Used to Spread Cross-Platform CRPx0 Malware appeared first on SecurityWeek.","CRPx0 is a sophisticated, cross-platform malware campaign that uses social engineering (free OnlyFans account offers) to deliver a multi-stage attack. The malware performs cryptocurrency theft via clipboard monitoring, large-scale data exfiltration, and ransomware encryption with double extortion. The campaign operates a leaks site claiming 38 victims and 10,839 terabytes of stolen data, with ransom notes in English, Russian, and Chinese.","CRPx0 malware campaign uses free OnlyFans lure to target macOS, Windows, and Linux systems.","OnlyFans – an attractive brand for hopeful users and their attackers. CRPx0 is a complex, stealthy and persistent malware campaign. It currently targets macOS and Windows systems, and appears to have Linux capabilities in development. It currently comprises cryptocurrency theft followed by large scale data exfiltration and ransomware. The campaign has been analyzed (PDF) in detail by Aryaka Threat Research Labs. The initial social engineering lure is the offer of a free OnlyFans account. Users interested in free access to OnlyFans might actively search for available options, and stumble across the threat actors’ OnlyfansAccounts.zip. By looking for unauthorized free access to paid-for content, these users have already demonstrated a willingness to be risk takers open to less than legitimate activity. They would be more willing to download the zip, and to accept that acquiring a free account might require some non-standard activity. That’s a good start for any attacker. The malicious zip contains a shortcut file (Onlyfans Accounts.lnk) which would appear to be a legitimate next step in pursuing a non-legitimate purpose. There is no apparent reason for the risk taker not to proceed. The lnk provides a file that appears to contain the promised account credentials. It is titled Accounts.txt, has the headline ’50 working Onlyfans account’ and lists what appears to be credentials – but in the background, it begins to install the malware. The attackers maintain control from their C2 while the malware collects environment data and establishes persistence. The malware even calls home periodically to see if there is a newer version of itself, and updates itself as necessary.Advertisement. Scroll to continue reading. There are three primary effects of CRPx0 campaign: cryptocurrency theft, data exfiltration, and delivery of ransomware. The crypto theft is achieved by continuously monitoring the system clipboard. If the victim copies a wallet address (while sending or receiving funds), this is detected – and the address switched out for one controlled by the attackers. So, if users copy their wallet address to give to the sender (ready to receive the crypto), they actually instruct the sender to send the money to the threat actors who receive the crypto. The second phase of the campaign is data exfiltration – the first part of a double extortion process. The data to be stolen is selected by the attackers via the C2. It will correlate with the user data that is subsequently encrypted – such as documents, media and images, emails, developer and code files, and engineering and design files. Once this data has been stolen, the attackers move to the encryption phase. “When the malware receives the ‘encryption’ command,” explains the analysis, “it downloads the crypter.py payload from a remote server and saves it locally. Once the file is successfully written, it is executed using the system’s Python interpreter.” A unique key is generated using the Fernet mechanism for AES encryption and sent to the C2. The targeted files are read, encrypted and saved with the extension ‘.crpx0’. Specific system and critical directories are excluded to ensure the system remains stable despite the ransomware. The desktop wallpaper is exchanged for the attackers’ ‘gotcha’ image, and ransom instruction notes are dropped in English, Russian, and Chinese. Victims are instructed to contact the attackers through multiple channels (including email, qTox, and Telegram). The campaign maintains its own leaks site. At the time of writing, it claims 38 victims compromised so far, with 23 leaks available. It also claims to have stolen a massive 10,839 terabytes of data. The remaining 15 victims have either paid the ransom, or the deadline for payment has not yet expired. Where the stolen data is available, it is being offered for a one-time fee of $500 in cryptocurrency. This provides ‘Lifetime access to all current and future leaks’, with ‘No monthly recurring charges’. “This attack is a highly organized, multi-platform threat that targets Windows and macOS, with potential support for Linux,” summarizes Aryaka. “Its capabilities include cryptocurrency theft, wallet seed phrase harvesting, deploying additional malicious payloads, and full-scale ransomware encryption. The operation is modular and adaptable, allowing attackers to escalate from opportunistic theft to large-scale data exfiltration and double extortion.” There is no apparent targeting in this campaign. It could be any user looking for a free OnlyFans account (hence, perhaps, the ransom notes appearing in English, Russian and Chinese). However, victims are more likely to be using their own personal device in the first instance. Most employees would be aware that the security department can readily see where they are going on a company device while in the office. Aryaka’s write-up includes a list of IoCs, and a mapping to MITRE ATT&CK. Related: Ransomware Group Takes Credit for Trellix Hack Related: Iranian APT Intrusion Masquerades as Chaos Ransomware Attack Related: Two US Security Experts Sentenced to Prison for Helping Ransomware Gang Related: Sandhills Medical Says Ransomware Breach Affects 170,000 Written By Kevin Townsend Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines. More from Kevin Townsend Build Application Firewalls Aim to Stop the Next Supply Chain AttackClaude Code OAuth Tokens Can Be Stolen Through Stealthy MCP HijackingAI Coding Agents Could Fuel Next Supply Chain CrisisHacker Conversations: Joey Melo on Hacking AIAnthropic Unveils Claude Security to Counter AI-Powered Exploit SurgeAI Fuels ‘Industrial’ Cybercrime as Time-to-Exploit Shrinks to HoursCyber Insurance Data Gives CISOs New Ammo for Budget TalksSevii Launches Cyber Swarm Defense to Make Agentic AI Security Costs Predictable Latest News Deal Reached With Hackers to Delete Data Stolen From the Canvas Educational PlatformWest Pharmaceutical Services Hit by Disruptive Ransomware AttackApple Patches Dozens of Vulnerabilities in macOS, iOSSAP Patches Critical S\u002F4HANA, Commerce VulnerabilitiesClaude Mythos Finds Only One Curl Vulnerability; Experts Divided on What It Really MeansIs the SOC Obsolete, and We Just Haven’t Admitted It Yet?TanStack, Mistral AI, UiPath Hit in Fresh Supply Chain AttackFrame Security Emerges From Stealth With $50M for Awareness and Training Platform Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: ROSI for CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveMalwarebytes has named Chung Ip as Chief Financial Officer.Semperis has appointed John Podboy as Chief Information Security Officer.Randy Menon has become Chief Product and Marketing Officer at One Identity.More People On The MoveExpert Insights Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right plat","https:\u002F\u002Fwww.securityweek.com\u002Ffree-onlyfans-lure-used-to-spread-cross-platform-crpx0-malware\u002F","https:\u002F\u002Fwww.securityweek.com\u002Fwp-content\u002Fuploads\u002F2024\u002F02\u002FMalware-Hunter-Killer.jpg","2026-05-12T13:46:49+00:00","2026-05-12T14:00:12.900672+00:00",8,[18,21,24,26],{"name":19,"type":20},"CRPx0","campaign",{"name":22,"type":23},"Fernet (AES encryption)","technology",{"name":25,"type":23},"Python interpreter",{"name":27,"type":28},"Aryaka","vendor","89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5",{"id":29,"icon":31,"name":32,"slug":33},null,"Malware","malware",[35,40],{"category":36},{"id":37,"icon":31,"name":38,"slug":39},"7d8b5ab8-ea0b-4ced-ae97-ec251b86993a","Ransomware","ransomware",{"category":41},{"id":42,"icon":31,"name":43,"slug":44},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[46,48,51,55,58],{"type":33,"value":19,"context":47},"Cross-platform malware campaign targeting macOS, Windows, and Linux with crypto theft, data exfiltration, and ransomware capabilities",{"type":33,"value":49,"context":50},"crypter.py","Payload downloaded by CRPx0 for AES encryption using Fernet mechanism",{"type":52,"value":53,"context":54},"mitre_attack","T1115","Clipboard Data (clipboard monitoring for wallet address substitution)",{"type":52,"value":56,"context":57},"T1005","Data from Local System (data exfiltration of documents, media, emails, code files)",{"type":52,"value":59,"context":60},"T1486","Data Encrypted for Impact (ransomware encryption with .crpx0 extension)"]