Thursday, April 10, 2025
Homecyber securityBeware of Clickfix: 'Fix Now' and 'Bot Verification' Lures Deliver and Execute...

Beware of Clickfix: ‘Fix Now’ and ‘Bot Verification’ Lures Deliver and Execute Malware

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated browser-based malware delivery method, dubbed ClickFix, has emerged as a significant threat to cybersecurity.

Leveraging deceptive prompts like “Fix Now” and “Bot Verification,” ClickFix tricks users into executing malicious commands by exploiting familiar system actions.

This technique bypasses conventional download workflows, relying on clipboard hijacking and user interaction to stage and execute malware.

- Advertisement - Google News
Clickfix
Verification prompt seen at soubtcevent[.]com.

The ClickFix Technique: A Breakdown

First observed in mid-2024, ClickFix uses deceptive web pages disguised as system alerts or CAPTCHA challenges to manipulate users into running malware.

The infection process typically unfolds in three steps:

  1. Clipboard Hijacking: Users are instructed to press Windows + R, opening the Run dialog box, followed by Ctrl + V to paste a preloaded command silently copied via JavaScript.
  2. Execution: Pressing Enter executes the payload, often launching mshta.exe or PowerShell to retrieve and run remote scripts.
  3. Payload Delivery: Depending on the variant, the malware may include information stealers or fileless PowerShell commands embedded in Base64-encoded scripts.

According to the Report, this method exploits users’ trust in routine system prompts, making it a low-friction attack vector for cybercriminals.

Real-World Examples of ClickFix

Recent investigations uncovered several domains actively employing ClickFix techniques:

  • Bitcoin-Themed Domains: Sites like soubtcevent[.]com mimic CAPTCHA verification pages and execute Base64-encoded PowerShell scripts upon user interaction. These scripts deliver malware such as Lumma Stealer and CryptBot via ZIP archives containing malicious executables (verify1.exe, verify2.exe).
  • Credential Theft Campaigns: Domains such as timestesol[.]com target Zoho Office Suite credentials by redirecting users to fake login pages after completing a “robot verification” prompt. Hardcoded Telegram bot tokens in the source code suggest stolen credentials are sent directly to attacker-controlled endpoints.
  • Compromised Infrastructure: Websites like riverview-pools[.]com copy PowerShell commands to users’ clipboards, delivering fileless payloads from compromised servers. These payloads further retrieve secondary scripts for staging malware execution.
Clickfix
Screenshot of the Zoho login present after passing verification.

Indicators of Compromise (IOCs)

To aid defenders in identifying ClickFix-related activity, researchers have compiled critical IOCs from observed domains and files:

DomainIP AddressCountry
soubtcevent[.]com94.181.229[.]250Russia
securedmicrosoft365[.]com20.217.17[.]201Israel
targett[.]top104.16.198[.]133United States
FilenameSHA-256 Hash
verify1.exedad4ecd247efa876faac2e3f67130951b044043ca21c5db6281ba2b8fce7a089
verify2.exe69c513f0ddf4416e0d47f778594fd76b96424359c7e9c2e5585ad0abaaf5dbc0

These observables highlight active infrastructure supporting ClickFix campaigns, enabling defenders to block malicious domains and files proactively.

To combat ClickFix-style attacks, organizations should adopt robust defenses:

  • Monitor clipboard-based execution involving PowerShell or mshta.exe.
  • Deploy endpoint detection tools configured to log unusual script activity and clipboard usage.
  • Block access to domains hosting verification-style lures mimicking CAPTCHA challenges or security prompts.
  • Encourage multi-factor authentication (MFA) to mitigate credential theft risks.

ClickFix represents a growing trend in browser-based attack vectors that exploit user trust through deceptive prompts.

By understanding its behavioral patterns and leveraging IOCs, defenders can strengthen their detection capabilities against this evolving threat landscape.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

SonicWall Patches Multiple Vulnerabilities in NetExtender Windows Client

SonicWall has issued a critical alert concerning multiple vulnerabilities discovered in its NetExtender Windows...

Cable: Powerful Post-Exploitation Toolkit for Active Directory Attacks

Cybersecurity researchers are raising alarms about Cable, a potent open-source post-exploitation toolkit designed to exploit...

Langflow AI Builder Vulnerability Allows Remote Server Takeover by Attackers

A critical security vulnerability has been discovered in the Langflow AI Builder, a popular...

Hackers Claim WooCommerce Breach Exposing 4.4 Million Customer Records

A hacker operating under the alias “Satanic” has claimed responsibility for a massive data...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

SonicWall Patches Multiple Vulnerabilities in NetExtender Windows Client

SonicWall has issued a critical alert concerning multiple vulnerabilities discovered in its NetExtender Windows...

Cable: Powerful Post-Exploitation Toolkit for Active Directory Attacks

Cybersecurity researchers are raising alarms about Cable, a potent open-source post-exploitation toolkit designed to exploit...

Langflow AI Builder Vulnerability Allows Remote Server Takeover by Attackers

A critical security vulnerability has been discovered in the Langflow AI Builder, a popular...