A sophisticated browser-based malware delivery method, dubbed ClickFix, has emerged as a significant threat to cybersecurity.
Leveraging deceptive prompts like “Fix Now” and “Bot Verification,” ClickFix tricks users into executing malicious commands by exploiting familiar system actions.
This technique bypasses conventional download workflows, relying on clipboard hijacking and user interaction to stage and execute malware.
First observed in mid-2024, ClickFix uses deceptive web pages disguised as system alerts or CAPTCHA challenges to manipulate users into running malware.
The infection process typically unfolds in three steps:
mshta.exe
or PowerShell to retrieve and run remote scripts.According to the Report, this method exploits users’ trust in routine system prompts, making it a low-friction attack vector for cybercriminals.
Recent investigations uncovered several domains actively employing ClickFix techniques:
soubtcevent[.]com
mimic CAPTCHA verification pages and execute Base64-encoded PowerShell scripts upon user interaction. These scripts deliver malware such as Lumma Stealer and CryptBot via ZIP archives containing malicious executables (verify1.exe
, verify2.exe
).timestesol[.]com
target Zoho Office Suite credentials by redirecting users to fake login pages after completing a “robot verification” prompt. Hardcoded Telegram bot tokens in the source code suggest stolen credentials are sent directly to attacker-controlled endpoints.riverview-pools[.]com
copy PowerShell commands to users’ clipboards, delivering fileless payloads from compromised servers. These payloads further retrieve secondary scripts for staging malware execution.To aid defenders in identifying ClickFix-related activity, researchers have compiled critical IOCs from observed domains and files:
Domain | IP Address | Country |
---|---|---|
soubtcevent[.]com | 94.181.229[.]250 | Russia |
securedmicrosoft365[.]com | 20.217.17[.]201 | Israel |
targett[.]top | 104.16.198[.]133 | United States |
Filename | SHA-256 Hash |
---|---|
verify1.exe | dad4ecd247efa876faac2e3f67130951b044043ca21c5db6281ba2b8fce7a089 |
verify2.exe | 69c513f0ddf4416e0d47f778594fd76b96424359c7e9c2e5585ad0abaaf5dbc0 |
These observables highlight active infrastructure supporting ClickFix campaigns, enabling defenders to block malicious domains and files proactively.
To combat ClickFix-style attacks, organizations should adopt robust defenses:
mshta.exe
.ClickFix represents a growing trend in browser-based attack vectors that exploit user trust through deceptive prompts.
By understanding its behavioral patterns and leveraging IOCs, defenders can strengthen their detection capabilities against this evolving threat landscape.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score of…
A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux, and…
Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security Features…
Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed in…
Security researchers have uncovered two critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that…
ESET, a leading cybersecurity firm, has shed light on one particularly insidious scheme: fake calls…