Introduction
In recent times, threat actors have increasingly adopted ClickFix social engineering attacks [1], a method that has demonstrated significant efficacy in malware deployment. This technique has been employed in various campaigns, notably by a suspected Russian espionage group targeting Ukrainian organizations [1].
Description
Threat actors are increasingly utilizing ClickFix social engineering attacks [1], which have proven effective for malware deployment [1]. Proofpoint’s analysis reveals multiple campaigns employing this tactic since March 2024 [1], including one by a suspected Russian espionage group targeting Ukrainian organizations [1]. Initially linked to the initial access broker TA571 and the ClearFake threat cluster [2], ClickFix has gained traction among various threat actors who impersonate legitimate software [2], such as Microsoft Word and Google Chrome, to distribute malware including AsyncRAT [2], Danabot [1] [2] [3], DarkGate [1] [3], Lumma Stealer [1] [2] [3], and NetSupport [1] [3].
This technique employs deceptive dialogue boxes with fake error messages that manipulate users into executing malicious PowerShell commands, effectively bypassing security measures [1]. These pop-up messages can appear on fraudulent websites or within malicious files [3], prompting users to copy and paste the error message into PowerShell [3]. A notable variant of ClickFix incorporates a fake CAPTCHA [2], utilizing an open-source toolkit named reCAPTCHA Phish [1] [2], which masquerades as a human verification check. This method has been observed in campaigns targeting government entities in Ukraine [2], as well as in a September 2024 campaign that targeted Swiss organizations, where users were misled into executing JavaScript that downloaded a ZIP file containing malicious payloads [2].
A specific ClickFix campaign attributed to a suspected Russian espionage actor [1], tracked as UAC-0050 [1], targeted Ukrainian organizations with emails containing suppressed HTML attachments [1]. These emails prompted users to execute a PowerShell script that ultimately downloaded a malicious payload known as Lucky Volunteer [1], an information-stealing malware [1]. The landing page for this campaign employed the reCAPTCHA phish ClickFix technique [1], despite the email content being in Ukrainian [1], indicating a sophisticated approach to social engineering [1].
Recent activity has reportedly affected at least 300 organizations globally [1], with the ClickFix technique evolving beyond its original associations to be employed by multiple unattributed threat clusters [2], particularly against transportation and logistics firms [2]. The increasing prevalence of ClickFix incidents is attributed to the declining effectiveness of traditional methods [3], such as infected macros and fake invoices [3], which are often blocked by security systems [3]. As adversaries adapt to users becoming more vigilant [2], organizations are encouraged to train their personnel specifically on recognizing and preventing ClickFix exploitation [2], highlighting the importance of awareness regarding this emerging threat and its warning signs.
Conclusion
The rise of ClickFix social engineering attacks underscores the evolving landscape of cyber threats, as traditional methods lose their effectiveness. Organizations must prioritize training and awareness to mitigate these sophisticated attacks. As threat actors continue to refine their techniques, it is imperative for security measures to adapt accordingly, ensuring robust defenses against such emerging threats.
References
[1] https://www.infosecurity-magazine.com/news/clickfix-cyber-malware-rise/
[2] https://www.proofpoint.com/us/blog/threat-insight/security-brief-clickfix-social-engineering-technique-floods-threat-landscape
[3] https://www.computing.co.uk/news/2024/security/researchers-report-rise-in-clickfix-social-engineering-attacks




