ClickFix: The New Malware Tactic Exploiting Social Engineering

ClickFix social engineering malware installation cybersecurity PowerShell drive-by download Zero Trust
Jim Gagnard
Jim Gagnard

Board Advisor

 
December 30, 2025 4 min read
ClickFix: The New Malware Tactic Exploiting Social Engineering

TL;DR

This article details the ClickFix social engineering attack, which tricks users into running malicious commands via deceptive prompts, leading to malware installation. It covers the attack's technical stages, its use by ransomware groups like Interlock, and outlines key defense strategies such as user education, PowerShell restrictions, and robust endpoint protection.

ClickFix Social Engineering Attacks: A Technical Deep Dive

ClickFix is a social engineering technique that tricks users into running malicious commands themselves, leading to malware installation and other malicious activities. This technique has become prevalent due to its ability to target multiple operating systems and bypass traditional security defenses. Security researchers have observed a significant increase in ClickFix attacks, with a 500%+ spike in 2025.

How ClickFix Works

ClickFix attacks exploit users' familiarity with CAPTCHAs and other verification prompts. The attack flow typically involves the following steps:

  1. Infection: Users visit a website infected with ClickFix, often through compromised legitimate sites or malicious advertisements.
  2. Deceptive Message: A fake error message or CAPTCHA appears, instructing the user to "fix" the problem by running a command in Windows Run, PowerShell, or Terminal.
  3. Command Execution: The user copies and pastes the command, believing they are solving an issue.
  4. Malware Installation: The command silently downloads and installs malware such as Lumma Stealer, DarkGate, or NetSupport RAT.

Image courtesy of Cybersecurity News

The effectiveness of ClickFix lies in its ability to bypass traditional security defenses. Because the user is running the command, antivirus and other security tools often do not flag it as malicious. This is further enhanced by the use of trusted tools like PowerShell and Run, which are built into Windows. More on ClickFix Analysis

Technical Details

A typical ClickFix attack involves the following technical stages:

  • Initial Access: Attackers gain initial access via drive-by downloads from compromised legitimate websites or through social engineering techniques. MITRE ATT&CK® Matrix for Enterprise
  • Execution: Malicious payloads are executed using mshta.exe or PowerShell, often downloading and running a malware dropper. PowerShell
  • Persistence: Persistence is established by creating a file in the Windows Startup folder or modifying Windows Registry keys. Windows Registry key modification
  • Steganography: Some ClickFix campaigns use steganography to hide malicious shellcode within image files, making detection more difficult. steganography
  • Payload Delivery: The final payload often includes info-stealing malware like LummaC2 or Rhadamanthys.

Fake Windows update

Image courtesy of Malwarebytes

Interlock Ransomware and ClickFix

The Interlock ransomware group has been observed using ClickFix as part of its attack chain. Interlock is a financially motivated group that targets businesses and critical infrastructure sectors across North America and Europe. CISA and FBI Warn of Escalating Interlock Ransomware Attacks

Interlock actors have been observed:

  • Obtaining initial access via drive-by downloads from compromised legitimate websites. drive-by download
  • Using ClickFix social engineering to trick users into executing malicious payloads. social engineering technique
  • Employing a double extortion model, encrypting systems after exfiltrating data. double extortion
  • Leveraging tools like Cobalt Strike and SystemBC for command and control.

Defense Strategies

To defend against ClickFix attacks, organizations should implement the following measures:

  • User Education: Train employees to recognize social engineering tactics and avoid running commands from untrusted sources. social engineering
  • Restrict PowerShell Execution: Implement policies to restrict PowerShell execution for standard users, ensuring only signed scripts can run. PowerShell scripts
  • Application Allowlists: Create application allowlists to manage and control software on the network. application allowlists
  • Network Monitoring: Utilize network intrusion detection systems (NIDS) to identify and report malicious events. Albert Network Monitoring and Management
  • Endpoint Protection: Deploy real-time anti-malware solutions with web protection components. anti-malware solution
  • DNS Filtering: Implement domain name system (DNS) filtering to prevent initial access to malicious domains.

Gopher Security's Zero-Trust Architecture

Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity architecture. Our platform converges networking and security across devices, apps, and environments—from endpoints and private networks to cloud, remote access, and containers—using peer-to-peer encrypted tunnels and quantum-resistant cryptography. This architecture is designed to mitigate threats like ClickFix by ensuring that every user, device, and application is authenticated and authorized before accessing any resource, regardless of location.

By implementing domain name system (DNS) filtering and web access firewalls, and training users to spot phishing attempts. Gopher Security provides robust endpoint detection and response (EDR) tooling and capabilities and can uncover hidden red flags of intrusion and can even prevent attackers gaining an initial foothold in the first place.

Gopher Security solutions can significantly reduce the risk of ClickFix attacks by:

  • Verifying User Identity: Ensuring that users are who they claim to be through multi-factor authentication and continuous monitoring.
  • Validating Device Security: Checking that devices meet security requirements before granting access.
  • Limiting Application Access: Restricting application access to only what is necessary for the user's role.
  • Securing Network Connections: Encrypting all network traffic to prevent eavesdropping and data theft.

Mitigations

FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

Links

Take Action

Protect your organization from advanced social engineering attacks like ClickFix. Contact Gopher Security today to learn more about our AI-powered, post-quantum Zero-Trust cybersecurity solutions and how we can help you build a more secure and resilient infrastructure.

Jim Gagnard
Jim Gagnard

Board Advisor

 

30-year CEO experiences of leading multiple $MM exits. Excellent operator of managing big enterprise companies.

Related News

Unlocking LockBit 5.0: Enhanced Encryption and Targeted Threats
LockBit 5.0

Unlocking LockBit 5.0: Enhanced Encryption and Targeted Threats

Discover the latest LockBit 5.0 ransomware evolution, its cross-platform capabilities, and advanced evasion tactics. Secure your defenses now!

By Divyansh Ingle January 8, 2026 4 min read
Read full article
CISA's KEV Catalog Grows by 1,484 Vulnerabilities in 2025
CISA KEV Catalog

CISA's KEV Catalog Grows by 1,484 Vulnerabilities in 2025

CISA's KEV Catalog grew to 1,484 with 245 new vulnerabilities in 2025. Learn which are actively exploited and how to protect your organization. Explore now!

By Divyansh Ingle January 7, 2026 7 min read
Read full article
Eaton UPS Software Vulnerabilities Allow Code Execution Risks
Eaton UPS Companion vulnerabilities

Eaton UPS Software Vulnerabilities Allow Code Execution Risks

Critical vulnerabilities found in Eaton UPS Companion software. High risk of code execution. Update to v3.0 now to protect your systems!

By Edward Zhou January 6, 2026 3 min read
Read full article
Iran's Covert Influence: Recruiting Dissidents to Target Israel
Israel Iran covert operations

Iran's Covert Influence: Recruiting Dissidents to Target Israel

Discover how Israel is shifting its covert operations strategy, recruiting Iranian dissidents for strikes inside Iran. Learn about the evolving secret war.

By Jim Gagnard January 5, 2026 5 min read
Read full article