#Clickfix

2025-06-20

🚨 New malware alert: Mocha Manakin uses #Clickfix (fakeCAPTCHA) to trick users into deploying a custom backdoor called NodeInitRAT. Red Canary warns it could lead to ransomware!

🔗 hackread.com/mocha-manakin-mal

#CyberSecurity #CyberAttack #fakeCAPTCHA #MochaManakin #NodeInitRAT

2025-06-18 (Wednesday): #SmartApeSG --> #ClickFix lure --> #NetSupportRAT --> #StealCv2

A #pcap of the traffic, the malware/artifacts, and some IOCs are available at malware-traffic-analysis.net/2.

Today's the 12th anniversary of my first blog post on malware-traffic-analysis.net, so I made this post a bit more old school.

HTML source of page from legitimate but compromised site showing SmartApeSG injected script.Example of a ClickFix-style page caused by the injected SmartApeSG script.  A victim must click to get the popup and follow the instructions to paste and run the malicious script.Traffic from an infection filtered in Wireshark.  This shows the NetSupport RAT C2 traffic and StealC v2 traffic.
2025-06-18

"Famous Chollima deploying Python version of GolangGhost RAT" published by CiscoTalos. #ClickFix, #FamousChollima, #PylangGhost, #DPRK, #CTI blog.talosintelligence.com/pyt

2025-06-18

📢 Campagne de malware utilisant ClickFix pour déployer ARECHCLIENT2
📝 Elastic Security Labs a détecté une augmentation des campagnes utilisant la technique **ClickFix**, une méthode d'ingénierie sociale qui incite les utilisateurs à exécuter du code mal...
📖 cyberveille : cyberveille.ch/posts/2025-06-1
🌐 source : elastic.co/security-labs/a-wre
#ARECHCLIENT2 #ClickFix #Cyberveille

:rss: Qiita - 人気の記事qiita@rss-mstdn.studiofreesia.com
2025-06-07
2025-06-05

🚨 Researchers warn of a surge in #ClickFix scams impersonating #Booking.com. Fake CAPTCHAs trick users into running malware like XWorm and DanaBot.

Read: hackread.com/clickfix-email-sc

#CyberSecurity #Malware #Phishing #XWorm #DanaBot #Scam

2025-06-05

Ran into a ClickFix incident where the commands were obfuscated like: "c^u^rl.e^x^e

Probably worth flagging on Commands that contain excessive carrots and have a parent process of explorer.exe or conhost.exe

#clickfix #intel #cybersecurity #blueteam #incidentresponse

☀️ Summer is Here and So Are Fake Bookings 🎣
🚨 #Phishing emails disguised as #booking confirmations are heating up during this summer travel season, using #ClickFix techniques to deliver #malware.
Fake Booking.com emails typically request payment confirmation or additional service fees, urging victims to interact with malicious payloads.
👨‍💻 Fake payment form analysis session: app.any.run/tasks/84cffd74-ab8

🔍 A quick search in Threat Intelligence Lookup reveals a clear spike in activity during May-June. Use this search request to find related domains, IPs, and sandbox analysis sessions:
intelligence.any.run/analysis/

Most recent samples use ClickFix, a #fakecaptcha where the victim is tricked into copy-pasting and running a #PowerShell downloader via terminal.
👨‍💻 ClickFix analysis session: app.any.run/tasks/2e5679ef-1b4

The downloaded executables belong to the #RAT malware families, giving attackers full remote access to infected systems.

❗️ How to stay safe from seasonal phishing threats during your vacation:
1️⃣ Validate sender domains. Emails from trusted booking providers, hotels, and airlines typically come from official domains such as
@booking
.com,
@airline
.com

2️⃣ Analyze suspicious files with #ANYRUN. Use #ANYRUN’s interactive sandbox to quickly detect threats, safely detonate phishing URLs, and observe malicious behavior in a controlled environment.

3️⃣ Only enter your personal data on trusted websites. Look for a valid HTTPS certificate and double-check that the site belongs to the real service.

4️⃣ Train staff on phishing and brand impersonation tactics, especially during peak travel periods.

🏝️ Have a safe and sweet vacation!

2025-05-30

Interlock ransomware: what you need to know - "We don’t just want payment; we want accountability." The malicious hackers behind the I... tripwire.com/state-of-security #ransomware #databreach #guestblog #interlock #clickfix #malware

2025-05-30

"We don’t just want payment; we want accountability." The malicious hackers behind the Interlock ransomware try to justify their attacks.

Learn more about what you need to know about Interlock in my article on the Tripwire blog.

tripwire.com/state-of-security

#cybersecurity #ransomware #clickfix

2025-05-29

Cảnh báo 4 Hình thức Tấn Công Người Dùng Trên TikTok và Smartphone

Cảnh báo 4 Hình thức Tấn Công Người Dùng Trên TikTok và Smartphone 1. ClickFix là gì? ClickFix là một kỹ thuật tấn công thuộc loại UI Redressing (đánh lừa giao diện người dùng), trong đó hành động của người dùng bị điều hướng một cách bí mật thông qua việc thao túng các yếu tố hiển…

maychu.top/2025/05/30/canh-bao

2025-05-25

Infostealery rozprzestrzeniają się przez TikTok i technikę ClickFix – szczegóły techniczne kampanii

W ostatnich tygodniach badacze bezpieczeństwa zaobserwowali nietypową, skuteczną kampanię malware, w której cyberprzestępcy wykorzystują popularność TikToka do dystrybucji złośliwego oprogramowania typu infostealer (m.in. Vidar, StealC, Latrodectus). Atak opiera się na tzw. technice ClickFix, polegającej na nakłanianiu użytkowników do samodzielnego uruchamiania złośliwych poleceń PowerShell. Poniżej przedstawiamy szczegółową analizę tej kampanii oraz...

#WBiegu #Clickfix #Malware #Rejestr #Sideloading #Tiktok

sekurak.pl/infostealery-rozprz

Herr Dennis 🖖🙂DennisKuester@norden.social
2025-05-25

Ich weiß ja nicht, wo ihr euch so herumtreibt, aber das könnte eventuell wichtig sein.

winfuture.de/news,151149.html

#ClickFix #TikTok #Malware

Brian Greenberg :verified:brian_greenberg@infosec.exchange
2025-05-23

🚨 Malware via TikTok? Believe it.

Hackers are using AI-generated TikTok videos to trick users into running PowerShell commands that drop info-stealers like Vidar and StealC — all through a tactic called ClickFix.

🧠 How it works:
📋 Copy content from the clipboard
⚠️ Paste & run it in PowerShell
💣 Malware executes — silently

This isn’t theoretical. It’s happening now.

As someone who teaches and works in this space — this is the kind of threat that blurs social engineering, platform trust, and user habit.

Stay sharp:
🔒 Train your teams
⚙️ Lock down script execution
🛑 Stop trusting random “fix” videos

#Cybersecurity #TikTokThreat #ClickFix #InfoStealer #SocialEngineering #security #privacy #cloud #infosec

thehackernews.com/2025/05/hack

2025-05-23

Another good deep dive into how some of these #ClickFix campaigns work, with #ioc included

#cybersecurity

From: @VirusBulletin
infosec.exchange/@VirusBulleti

2025-05-23

TikTok just got a new menace: AI-generated "tutorials" that trick you into running harmful commands. Could your next how-to video be putting your device at risk? Learn how ClickFix is redefining cyber scams.

thedefendopsdiaries.com/unmask

#clickfix
#tiktoksecurity
#cyberthreats
#malware
#socialengineering

2025-05-20

State-sponsored threat actors often leverage techniques first developed and deployed by cybercriminal actors. One example is #ClickFix, a highly effective technique that involves clever #socialengineering.

Listen as Proofpoint threat research experts Selena Larson, Sarah Sabotka, and Saher Naumaan deep dive into how modern #espionage and #cybercrime are increasingly blurring lines.

Stream DISCARDED now:
Apple Podcasts: brnw.ch/21wSNbM
Spotify: brnw.ch/21wSNbL
Web player: brnw.ch/21wSNbN

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst