κατασκευή ιστοσελίδων ρόδος

TECH - WEB DEVELOPMENT NEWS

Get the latest tech - web development news and analysis on industry around the world.

  • HOME
You are here: Home / INDUSTRY NEWS / New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently
άμυνα
.

New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

06/06/2025

A sophisticated new social engineering attack campaign has emerged that exploits users’ familiarity with routine security checks to deliver malware through deceptive Cloudflare verification pages.

The ClickFix attack technique represents a concerning evolution in phishing methodology, abandoning traditional file downloads in favor of manipulating users into executing malicious commands directly on their own systems.

The attack operates by presenting victims with what appears to be a legitimate Cloudflare Turnstile interface, complete with official branding, authentic wording, and dynamically generated Ray IDs that reinforce the illusion of legitimacy.

When users encounter these fake verification pages, they see familiar messages such as “Checking if the site connection is secure – Verify you are human,” identical to what they would expect from genuine Cloudflare protection mechanisms.

This calculated mimicry exploits verification fatigue, a phenomenon where internet users have become conditioned to quickly click through security prompts without careful examination.

SlashNext researchers identified this emerging threat as part of their ongoing threat intelligence operations, noting the attack’s particularly insidious approach to bypassing traditional security measures.

The technique has proven remarkably effective because it leverages user trust in established security providers while requiring no sophisticated exploits or zero-day vulnerabilities.

Instead, the attack relies on convincing users to voluntarily execute malicious code under the guise of completing a routine verification process.

The campaign has been observed delivering various malware families, including information stealers like Lumma and Stealc, as well as remote access trojans such as NetSupport Manager.

The attack’s success stems from its ability to bypass traditional security filters by having users execute legitimate system utilities with malicious parameters, rather than downloading suspicious executable files.

This approach effectively circumvents many endpoint protection solutions that focus on scanning downloaded binaries.

Technical Infection Mechanism and Clipboard Exploitation

The ClickFix attack employs a sophisticated clipboard manipulation technique that occurs entirely within the victim’s browser environment.

When users interact with the fake Cloudflare verification page by clicking the “Verify you are human” checkbox, the malicious webpage’s embedded JavaScript immediately executes a hidden script that creates an invisible text element containing an obfuscated PowerShell command.

This command is automatically copied to the user’s clipboard using standard web APIs, leaving no visible indication of the clipboard compromise.

The attack page subsequently presents users with seemingly legitimate verification steps that instruct them to press specific key combinations: Windows+R to open the Run dialog box, followed by Ctrl+V to paste the clipboard contents, and finally Enter to execute the command.

By this point, the dangerous PowerShell payload is already residing in the user’s clipboard, waiting to be unknowingly executed.

The malicious command is typically structured as a one-liner that retrieves and executes second-stage malware from remote servers, often utilizing Base64 encoding or other obfuscation techniques to avoid detection.

The fake Cloudflare page shown at the start of the attack (Source – SlashNext)

The initial fake Cloudflare page that users encounter at the beginning of the attack sequence.

The step-by-step instructions that trick users into executing malware (Source – SlashNext)

While this shows the step-by-step instructions that manipulate users into executing the malware payload.

A hidden PowerShell command copied to the clipboard (Source – SlashNext)

Besides this, this depicts the hidden PowerShell command that gets copied to the user’s clipboard during the verification process.

The entire attack infrastructure is contained within a single, self-contained HTML file that embeds all necessary images, styles, and scripts locally, enabling the fake page to load seamlessly on the attacker’s chosen domain without requiring external resources that might trigger security warnings.

Speed up and enrich threat investigations with Threat Intelligence Lookup! -> 50 trial search requests
Source: cybersecuritynews.com

Filed Under: INDUSTRY NEWS Tagged With: Source-10

QNAP NetBak Replicator Vulnerability Let Attackers Execute Unauthorized Code

QNAP has released a security advisory detailing a vulnerability in its NetBak Replicator utility that could allow local attackers to execute unauthorized code. The flaw, identified as CVE-2025-57714, has been rated as “Important” and affects specific versions of the backup and restore software. The company has already issued a patch and is urging users to update their systems to prevent … [Read More...]

How Windows Command-line Utility PsExec Can Be Abused To Execute Malicious Code

PsExec represents one of the most contradictory tools in the cybersecurity landscape, a legitimate system administration utility that has become a cornerstone of malicious lateral movement campaigns. Recent threat intelligence reports indicate that PsExec remains among the top five tools used in cyberattacks as of 2025, with ransomware groups like Medusa, LockBit, and Kasseika actively … [Read More...]

You'd think this was a real Stream Deck, but this genius DIYer 3D printed it and made it smart-home ready

Elgato's Stream Deck isn't meant for everyone, but it's one of the most widely adopted devices in recent years, especially among streamers, content creators, and productivity enthusiasts. Stream Deck's growing popularity also led to other players entering the space to compete with Corsair and giving users more choices. However, these aren't the only options, as it's pretty simple to build your own … [Read More...]

PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability

A critical zero-day vulnerability in Oracle E-Business Suite has emerged as a significant threat to enterprise environments, with proof-of-concept (PoC) exploit code now publicly available.  CVE-2025-61882 presents a severe security risk, achieving a maximum CVSS 3.1 score of 9.8 and enabling remote code execution without authentication across multiple Oracle E-Business Suite … [Read More...]

Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files

Oct 06, 2025Ravie LakshmananEmail Security / Zero-Day A now patched security vulnerability in Zimbra Collaboration was exploited as a zero-day earlier this year in cyber attacks targeting the Brazilian military. Tracked as CVE-2025-27915 (CVSS score: 5.4), the vulnerability is a stored cross-site scripting (XSS) vulnerability in the Classic Web Client that arises as a result of insufficient … [Read More...]

Oppo Reno 15 Series Key Specifications and India Launch Timeline Leaked

Oppo Reno 15 series, which is expected to comprise the Oppo Reno 15, Reno Pro, and Reno 15 Pro+, might debut in China in the second half of 2025. This means that its launch could be weeks away, or it might debut in a couple of months. A tipster has now revealed that the smartphone lineup has entered the testing phase in global markets, including India. The India launch timeline of the Oppo Reno 15 … [Read More...]

iQOO Neo 11 Key Specifications Leaked; Could Feature Snapdragon 8 Elite Chipset, 7,500mAh Battery

iQOO appears to be preparing for the launch of the iQOO Neo 11, which could arrive in China and eventually make its way to global markets. Although the Vivo sub-brand has yet to reveal any plans for a new Neo series smartphone, a tipster has leaked key specifications that point to a significant upgrade over the existing Neo 10 model. The purported iQOO Neo 11 is expected to feature a … [Read More...]

This cozy medieval city builder with 85% positive Steam reviews is still on discount

Well, that's another big Steam seasonal sale in the books. How did yours go? I didn't pick up a ton of titles this time around, but I still scored some nice discounts on games like The Roottrees Are Dead, so I'm still pleased. Source: xda-developers.com … [Read More...]

Moto G06 Power India Launch Date Announced; Key Features, Flipkart Availability Confirmed

Moto G06 Power was unveiled at IFA 2025 alongside the standard Moto G06 and Motorola Edge 60 Neo in September. The company has now announced that the Power variant will arrive in India soon. Alongside confirming the launch date, Motorola has revealed some key features of the upcoming handset. The Indian version is expected to share similarities with its global counterpart. It will be available in … [Read More...]

Who Will Be Apple’s Next CEO After Tim Cook? John Ternus Could Reportedly Take Charge

Apple's list of senior executives who have left the company is growing long. From former design chief Jony Ive and retail head Angela Ahrendts in 2019 to former Chief Financial Officer, Luca Maestri, and former Chief Operating Officer, Jeff Williams, in the last two years, the company has lost a significant part of its vanguard. While the Cupertino-based tech giant has been able to find … [Read More...]

Tags

Source-1 Source-2 Source-3 Source-4 Source-5 Source-6 Source-7 Source-8 Source-9 Source-10 Source-12 Source-13 Source-15 Source-16

Tech Web Development News

This is a PERSONAL and PRIVATE WEBPAGE. Please leave this page. Contact me via email : admin@news-6.com about anything you would like to ask or problem.

Tech News

Disclaimer!
In every post is written below the original source of the post. Copyrights belong on their owners.

Web Development News

HOTELS – CRUISES – CARS – TRAVEL

Recent Posts

  • QNAP NetBak Replicator Vulnerability Let Attackers Execute Unauthorized Code
  • How Windows Command-line Utility PsExec Can Be Abused To Execute Malicious Code
  • You'd think this was a real Stream Deck, but this genius DIYer 3D printed it and made it smart-home ready
  • PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability
  • Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files

Technology - Seo

Categories

  • INDUSTRY NEWS

World Industry News

Privacy & Cookies: This site uses cookies.
To find out more, as well as how to remove or block these, see here: Our Cookie Policy
TECH - WEB DEVELOPMENT NEWS @ COPYRIGHTS 2023