Researchers at BlackFrog revealed Matrix Push C2, a malicious command-and-control (C2) system that leverages web browser push notifications to deliver malware. The attackers use social engineering to obtain permission for notifications, then send fake OS or security alerts that redirect victims to phishing pages or malware downloads. The operation is described as fileless since it relies on the browser’s notification system rather than a traditional malware file on the device.
BlackFrog’s report, published on November 20, outlines how Matrix Push C2 abuses legitimate browser features as a C2 channel. The workflow typically begins with convincing users to enable browser notifications on compromised or malicious sites. After subscription, a direct line to the user’s device is established through the browser, enabling the attackers to push out convincing error messages and security alerts.
“Matrix Push C2 abuses the legitimate web browser push notification system as a C2 channel.”
When a victim clicks a fake notification, they are directed to a site controlled by the attackers, which often hosts phishing pages or malware downloads. The campaign monitors infected clients in real time and can also scan for cryptocurrency wallets.
The tactic exploits built‑in browser features to bypass some traditional detection methods. Since the interaction occurs within the notifications subsystem, there is no initial malware file present on the system, complicating early detection and response.
BlackFrog identifies Matrix Push C2 as a browser-based C2 platform that uses fake notifications to redirect users to phishing sites or malware, highlighting a fileless attack surface via browser push channels.