ClickFix Attack Emerges by Over 500% - Hackers Actively Using This Technique to Trick Users

The attack presents victims with fake error messages or verification prompts that appear legitimate, instructing them to copy and paste seemingly harmless commands to resolve fictitious technical issues. Unlike traditional attack methods, ClickFix weaponizes the frustrating but commonplace experience of solving reCAPTCHA challenges, transforming these mundane security checks into dangerous traps. The ClickFix attack chain begins with sophisticated social engineering that exploits users’ conditioned responses to web security prompts. Geographic analysis reveals that ClickFix attacks have achieved global reach, with Japan bearing the brunt of attacks at 23% of all detections, followed by Peru at 6%, and Poland, Spain, and Slovakia each experiencing over 5% of global attack attempts. This PowerShell payload serves as the initial stage of a multi-layered attack chain, typically executing commands that download and launch secondary payloads while maintaining the illusion of legitimate system maintenance. The malware’s versatility has attracted a diverse array of threat actors, from cybercriminal groups distributing infostealers and ransomware to sophisticated nation-state actors including North Korea-aligned Kimsuky and Lazarus groups, Russia-aligned Callisto and Sednit, Iran-aligned MuddyWater, and Pakistan-aligned APT36. This alarming growth has propelled ClickFix to become the second most prevalent attack vector after phishing, accounting for nearly 8% of all blocked cyberattacks according to recent threat intelligence data. The ClickFix technique represents a cunning evolution in cybercriminal tactics, exploiting users’ familiarity with routine web verification processes to deliver malicious payloads. A sophisticated new social engineering technique called ClickFix has exploded across the cyberthreat landscape, experiencing an unprecedented surge of 517% between the second half of 2024 and the first half of 2025. A typical ClickFix payload might include encoded Base64 strings that, when executed, establish persistence mechanisms, disable security features, and initiate communication with command-and-control servers. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. The technique first emerged in March 2024 through campaigns documented by Proofpoint, initially deployed by threat groups ClearFake and TA571, but has since evolved into a widespread phenomenon affecting millions of users worldwide. The fake interface displays error messages claiming that content cannot be accessed due to technical issues, accompanied by prominent “Fix it” buttons that promise immediate resolution. ESET researchers noted that the attack’s effectiveness stems from its psychological manipulation of user behavior, capitalizing on the prevalence of legitimate verification processes that have trained users to follow copy-paste instructions without question. Threat actors create convincing replicas of popular services such as Booking.com, Google Meet, or Microsoft platforms, presenting victims with what appears to be a routine verification step. ESET analysts identified that ClickFix campaigns have rapidly expanded beyond their initial scope, now targeting users across Windows, Linux, and macOS platforms. The interface then instructs users to open a PowerShell terminal and paste the copied content to “resolve” the fabricated error. The malware employs various “envelopes” or obfuscation techniques to mask secondary payloads, making detection challenging for traditional antivirus solutions that rely primarily on signature-based detection methods. This conditioning, combined with the technique’s technical sophistication, has enabled ClickFix to achieve remarkable success rates across diverse target populations and geographic regions. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. The copied commands often contain obfuscated PowerShell scripts designed to evade basic security detection. Tushar is a Cyber security content editor with a passion for creating captivating and informative content.

This Cyber News was published on cybersecuritynews.com. Publication date: Fri, 27 Jun 2025 06:55:08 +0000


Cyber News related to ClickFix Attack Emerges by Over 500% - Hackers Actively Using This Technique to Trick Users

ClickFix Attack Emerges by Over 500% - Hackers Actively Using This Technique to Trick Users - The attack presents victims with fake error messages or verification prompts that appear legitimate, instructing them to copy and paste seemingly harmless commands to resolve fictitious technical issues. Unlike traditional attack methods, ClickFix ...
3 hours ago Cybersecuritynews.com Kimsuky Lazarus Group MuddyWater APT3
State Sponsored Hackers Now Widely Using ClickFix Attack Technique in Espionage Campaigns - While currently limited to experimental usage by these state-sponsored groups, the increasing popularity of ClickFix in both cybercrime and espionage campaigns suggests the technique will likely become more widely adopted as threat actors continue to ...
2 months ago Cybersecuritynews.com Kimsuky MuddyWater
Hackers Employ New ClickFix Captcha Technique to Deliver Ransomware - The integration of Qakbot with the ClickFix technique allows attackers to bypass traditional security measures by leveraging user interaction to execute malicious commands. A sophisticated social engineering technique known as ClickFix has emerged, ...
2 months ago Cybersecuritynews.com
Check Point released hotfix for actively exploited VPN zero-day - MUST READ. Check Point released hotfix for actively exploited VPN zero-day. Microsoft Patch Tuesday security updates for May 2024 fixes 2 actively exploited zero-days. Critical Fortinet's FortiClient EMS flaw actively exploited in the wild. Apple ...
1 year ago Securityaffairs.com CVE-2024-23222 CVE-2023-22515 CVE-2023-40044 CVE-2023-20109
Interlock ransomware gang pushes fake IT tools in ClickFix attacks - The Interlock ransomware gang now uses ClickFix attacks that impersonate IT tools to breach corporate networks and deploy file-encrypting malware on devices. Though this isn't the first time ClickFix has been linked to ransomware infections, ...
2 months ago Bleepingcomputer.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
State-sponsored hackers embrace ClickFix social engineering tactic - Proofpoint reports that APT28, a GRU unit, also used ClickFix as early as October 2024, using phishing emails mimicking a Google Spreadsheet, a reCAPTCHA step, and PowerShell execution instructions conveyed via a pop-up. ClickFix attacks are gaining ...
2 months ago Bleepingcomputer.com APT28 Kimsuky MuddyWater
New LUMMAC.V2 Stealer Using ClickFix Technique to Trick Users in Execute Malicious Commands - Cyber Security News - The LUMMAC.V2 campaign represents a significant threat not only due to its extensive data theft capabilities but also because it exploits human behavior rather than technical vulnerabilities, making traditional security measures less effective at ...
1 month ago Cybersecuritynews.com
New ClickFix attack deploys Havoc C2 via Microsoft Sharepoint - A newly uncovered ClickFix phishing campaign is tricking victims into executing malicious PowerShell commands that deploy the Havok post-exploitation framework for remote access to compromised devices. Threat actors have also begun to evolve the ...
3 months ago Bleepingcomputer.com
ClickFix Captcha - A Creative Technique That Allow Attackers Deliver Malware and Ransomware on Windows - This technique, known as ClickFix Captcha, exploits users’ trust in familiar web elements to bypass traditional security measures and deliver malicious payloads to Windows systems. The researchers noted the commands typically invoke PowerShell ...
2 months ago Cybersecuritynews.com
New MOVEit Transfer critical bug is actively exploited - MUST READ. New MOVEit Transfer critical bug is actively exploited. CISA adds Microsoft SharePoint bug disclosed at Pwn2Own to its Known Exploited Vulnerabilities catalog. Critical Fortinet's FortiClient EMS flaw actively exploited in the wild. PoC ...
1 year ago Securityaffairs.com CVE-2020-3259 CVE-2023-22515 CVE-2023-40044 CVE-2023-20109 Rocke
Hackers now testing ClickFix attacks against Linux targets - A new campaign employing ClickFix attacks has been spotted targeting both Windows and Linux systems using instructions that make infections on either operating system possible. However, it is possible that APT36 is currently experimenting to ...
1 month ago Bleepingcomputer.com Transparent Tribe APT3
ClickFix attack delivers infostealers, RATs in fake Booking.com emails - Microsoft is warning that an ongoing phishing campaign impersonating Booking.com is using ClickFix social engineering attacks to infect hospitality workers with various malware, including infostealers and RATs. In the phishing campaign discovered by ...
3 months ago Bleepingcomputer.com
iClicker hack targeted students with malware via fake CAPTCHA - The website of iClicker, a popular student engagement platform, was compromised in a ClickFix attack that used a fake CAPTCHA prompt to trick students and instructors into installing malware on their devices. According to a security alert from the ...
1 month ago Bleepingcomputer.com
North Korean hackers adopt ClickFix attacks to target crypto firms - Sekoia says that Lazarus impersonates numerous well-known companies in the latest campaign, including Coinbase, KuCoin, Kraken, Circle, Securitize, BlockFi, Tether, Robinhood, and Bybit, from which the North Korean threat actors recently stole a ...
2 months ago Bleepingcomputer.com
Attack Vector vs Attack Surface: The Subtle Difference - Cybersecurity discussions about "Attack vectors" and "Attack surfaces" sometimes use these two terms interchangeably. This article guides you through the distinctions between attack vectors and attack surfaces to help you better understand the two ...
2 years ago Trendmicro.com
2,800+ Hacked Websites Attacking MacOS Users With AMOS Stealer Malware - BadByte researchers said to Cyber Security News that the malware employs a deceptive technique known as “ClickFix” or “ClearFix” that displays fake Google reCAPTCHA verification prompts only to macOS users. “This is one ...
1 month ago Cybersecuritynews.com
Purple teaming and the role of threat categorization - Red team assessment, penetration testing, and even purple team assessments are all designed to answer these questions. As attacks get more complex, these assessments struggle to provide comprehensive answers. These assessment services typically test ...
1 year ago Helpnetsecurity.com
HackerOne paid ethical hackers over $300 million in bug bounties - HackerOne has announced that its bug bounty programs have awarded over $300 million in rewards to ethical hackers and vulnerability researchers since the platform's inception. Thirty hackers have earned over a million USD for their submissions, and ...
1 year ago Bleepingcomputer.com Inception Hunters
How Hackers Interrupted GTA 5 Online Gameplay on PC - Recently, a cyber-attack on Grand Theft Auto 5 Online on PC caused an interruption to thousands of players’ gameplays. The game was completely taken offline and players couldn’t even access the main gameplay menu. The attack caused an uproar ...
2 years ago Hackread.com
New Stealthy Malware 'Waiting Thread Hijacking' Technique Bypasses Modern Defenses - Unlike traditional thread hijacking, which requires suspending and resuming threads using easily monitored APIs like SuspendThread and ResumeThread, WTH targets threads already in a waiting state, eliminating the need for suspicious thread ...
2 months ago Cybersecuritynews.com
Hackers breach Australian court hearing database - The court system for Australia's second-most-populated state was hit by a ransomware attack that potentially exposed sensitive recordings of some court hearings. Court Services Victoria, an administrative body that supports the operations of the ...
1 year ago Therecord.media Qilin
Lampion Banking Malware Employs ClickFix Lures To Steal Banking Information - Once executed, the malware begins its covert operation to harvest banking credentials, credit card information, and other sensitive financial data from compromised systems. A sophisticated banking trojan known as Lampion has resurfaced with an ...
1 month ago Cybersecuritynews.com
Booking.com hackers increase attacks on customers - Hackers are increasing their attacks on Booking.com customers by posting adverts on dark web forums asking for help finding victims. Cyber-criminals are offering up to $2,000 for login details of hotels as they continue to target the people who are ...
1 year ago Bbc.com
New ClickFix Attack Mimics Ministry of Defense Website to Attack Windows & Linux Machines - The attack creates convincing replicas of Ministry of Defense websites across multiple countries, tricking users into downloading what appears to be required security updates or official documents. Initial analysis suggests the campaign began in ...
1 month ago Cybersecuritynews.com