Free background removal tool hides password-stealing malware

Craig Nash
By
Craig Nash
AI-powered tech writer covering artificial intelligence, chips, and computing.
8 Min Read
Free background removal tool hides password-stealing malware — AI-generated illustration

A free background removal tool that appears legitimate is actually a sophisticated malware delivery system, according to researchers at Huntress. The background removal tool malware, called BackgroundFix, uses a ClickFix social engineering tactic to trick users searching for selfie-editing tools into downloading credential-stealing malware and remote access trojans.

Key Takeaways

  • BackgroundFix mimics legitimate background removal tools to lure victims through search results
  • Users upload images, see a fake progress bar, then click Download to trigger malware deployment
  • A fake CAPTCHA checkbox copies malicious PowerShell commands to the clipboard via JavaScript
  • CastleLoader orchestrates deployment of a .NET stealer targeting passwords, crypto wallets, and Telegram sessions
  • NetSupport RAT is dropped for persistent remote access to compromised systems

How the Background Removal Tool Malware Attack Works

The attack chain is deceptively simple. A user searching for a background removal tool clicks a malicious search result that mimics legitimate services. They upload an image to the fake site and watch a convincing progress bar animate. When they click Download, the site displays a fake verification prompt: “Verify you’re not a robot” with a checkbox. This is where the trap closes. Checking the box triggers JavaScript that copies a malicious PowerShell command to the clipboard using document.execCommand(“copy”). Simultaneously, the page sends telemetry to a threat actor server via navigator.sendBeacon, confirming the victim’s engagement. The user then sees instructions: Press Win+R, paste (Ctrl+V), press Enter. Most users follow these steps without question, executing the hidden payload.

The uploaded images themselves are never processed, stored, or transmitted to remote servers. They remain local on the user’s machine, which means the threat actor’s interest is not in your photos—it is in what runs on your system after the fake download completes. This distinction matters because it narrows the attack surface to code execution, not data exfiltration of the images themselves.

What Background Removal Tool Malware Actually Installs

Once the PowerShell payload executes, CastleLoader takes over as an orchestration layer. This loader drops a custom .NET stealer designed to extract sensitive data from the compromised system. The stealer targets browser passwords stored in Chrome, Edge, and Firefox; cryptocurrency wallet vaults; and active Telegram sessions. A single successful infection can hand threat actors access to financial accounts, encrypted messaging platforms, and identity credentials in minutes. CastleLoader also deploys NetSupport RAT—a remote access trojan that persists on disk for follow-up exploitation. This dual-payload approach gives attackers both immediate data theft and long-term control over the victim’s machine.

The exfiltration method itself is notable for its inefficiency. Screenshot data is sent as uncompressed multi-megabyte BMP files over HTTPS with high-entropy bodies, creating a detectable network signature that security teams can spot without needing to reverse-engineer the malware internals. This network-level visibility is one of the few reliable detection signals for this attack family, since the malware uses legitimate Windows binaries and living-off-the-land techniques to evade endpoint protection.

Background Removal Tool Malware Within the Broader ClickFix Campaign

BackgroundFix is not an isolated threat. It is part of the ClickFix social engineering family first documented in May 2024 by Sekoia. ClickFix encompasses multiple variants: CrashFix spoofs browser crash dialogs, other variants fake Google Meet or reCAPTCHA pages, and some impersonate Chrome or Facebook error popups. The common thread is psychological manipulation. Threat actors create urgency or trust by mimicking familiar interfaces, then trick users into running commands via Win+R and Ctrl+V. BackgroundFix refines this approach by targeting a specific use case—selfie editing—that feels harmless and everyday. Why would someone suspect a background removal tool? The answer is they would not, which is precisely why this variant is effective.

Payloads across ClickFix campaigns vary but often include Lumma Stealer, Latrodectus, Xworm, AsyncRAT, and SectopRAT in addition to NetSupport RAT. The modular nature of CastleLoader allows threat actors to customize which tools drop onto each victim’s machine, enabling them to target different objectives—credential theft, cryptomining, ransomware staging, or persistent espionage—from the same initial infection vector.

How to Protect Against Background Removal Tool Malware

The strongest defense is skepticism about unexpected prompts. If a simple image editor suddenly asks you to verify you are not a robot via a CAPTCHA, or if it instructs you to open Run dialog and paste commands, stop immediately. Legitimate image editors do not require this workflow. Search directly for established tools with recognizable brand names and verified download links from official websites, not search results. Use browser security extensions that warn about suspicious sites, and keep Windows Defender or a third-party antivirus up to date. For organizations, network monitoring that flags high-entropy HTTPS traffic or unusual BMP exfiltration can detect this attack before data loss occurs. Multi-factor authentication on email and financial accounts limits damage if passwords are stolen.

Can I trust free online image editors?

Free online image editors are generally safe if they come from reputable sources with clear branding and established track records. Legitimate tools do not ask you to run PowerShell commands or verify yourself via CAPTCHA. If a tool requires unusual steps or feels off, use a different service. Always check the URL—malicious sites often misspell domain names or use generic subdomains to mimic legitimate services.

What should I do if I clicked the checkbox?

If you checked the “verify you are not a robot” box on a suspicious background removal site, assume your system is compromised. Immediately change passwords for email, banking, and cryptocurrency accounts from a different device. Run a full antivirus scan and consider using malware removal tools like Malwarebytes. If you have cryptocurrency wallets or financial accounts, monitor them closely for unauthorized activity. For maximum safety, isolate the infected machine from your network until it is fully cleaned.

Why is screenshot exfiltration detectable?

The malware sends uncompressed BMP files—large, data-heavy image files—over HTTPS with distinctive high-entropy patterns. Network monitoring tools can flag this traffic as anomalous without needing to decrypt the connection or analyze the malware code itself. This makes BackgroundFix easier to detect at the network level than some other stealer variants that use compression or encrypted tunnels.

BackgroundFix succeeds because it exploits a legitimate desire—removing backgrounds from selfies—and wraps malware in a familiar workflow. The attack is not sophisticated in its technical execution, but it is ruthlessly effective at social engineering. Users trust image editors because they use them regularly. That trust is the vulnerability. The lesson for anyone online is simple: if a tool asks you to run system commands or complete unusual verification steps, it is not a tool—it is a trap. Stay skeptical, verify sources, and remember that convenience is often where attackers hide.

This article was written with AI assistance and editorially reviewed.

Source: TechRadar

Share This Article
AI-powered tech writer covering artificial intelligence, chips, and computing.