Cybercriminals are leveraging fake CAPTCHA verification pages dubbed ClickFix to distribute malware, including infostealers, ransomware, and the notorious Qakbot banking trojan.
This technique manipulates users into executing malicious commands disguised as routine “verify you are human” prompts.
The attack begins with a phishing page redirecting victims to a fake CAPTCHA site (e.g., cfcaptcha[.]com), where they are instructed to press Windows Key + R, paste a clipboard-injected command via CTRL + V, and execute it with Enter.
This triggers a PowerShell script that downloads and runs malware payloads, such as Qakbot, from attacker-controlled domains like duolingos[.]com.
The malware employs layered obfuscation, including XOR-encrypted hex strings and dynamic URL generation, to evade detection.
For instance, the downloaded ZIP file (flswunwa.zip) from duolingos[.]com was hosted behind Cloudflare, returning 404 errors to frustrate analysis.
Further investigation revealed a PHP-based dropper acting as a proxy to fetch payloads from secondary servers, masking the true attack infrastructure.
According to the Report, despite partial takedowns of related domains, the technique’s reliance on social engineering ensures continued effectiveness.
ClickFix aligns with multiple MITRE ATT&CK tactics, including Initial Access (Phishing), Execution (PowerShell), and Defense Evasion (Obfuscation).
To mitigate risks, organizations should:
The resurgence of Qakbot and the adaptability of ClickFix underscore the need for proactive defenses against evolving social engineering threats.
Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!
As cyber threats continue to evolve, Security Operations Centers (SOCs) require robust tools to detect,…
Cybersecurity agencies worldwide have issued a joint advisory warning against the growing threat posed by…
Oracle Corporation has confirmed a data breach involving its older Gen 1 servers, marking its…
A critical security vulnerability, CVE-2025-31125, has been identified in the Vite development server. Due to improper…
A newly identified Android spyware app is elevating its tactics to remain hidden and unremovable…
Malicious PDF files have emerged as a dominant threat vector in email-based cyberattacks, accounting for…