ClickFix: The New Malware Tactic Exploiting Social Engineering

ClickFix social engineering malware installation cybersecurity PowerShell drive-by download Zero Trust
Jim Gagnard
Jim Gagnard

Board Advisor

 
December 30, 2025 4 min read
ClickFix: The New Malware Tactic Exploiting Social Engineering

TL;DR

  • This article details the ClickFix social engineering attack, which tricks users into running malicious commands via deceptive prompts, leading to malware installation. It covers the attack's technical stages, its use by ransomware groups like Interlock, and outlines key defense strategies such as user education, PowerShell restrictions, and robust endpoint protection.

ClickFix Social Engineering Attacks: A Technical Deep Dive

ClickFix is a social engineering technique that tricks users into running malicious commands themselves, leading to malware installation and other malicious activities. This technique has become prevalent due to its ability to target multiple operating systems and bypass traditional security defenses. Security researchers have observed a significant increase in ClickFix attacks, with a 500%+ spike in 2025.

How ClickFix Works

ClickFix attacks exploit users' familiarity with CAPTCHAs and other verification prompts. The attack flow typically involves the following steps:

  1. Infection: Users visit a website infected with ClickFix, often through compromised legitimate sites or malicious advertisements.
  2. Deceptive Message: A fake error message or CAPTCHA appears, instructing the user to "fix" the problem by running a command in Windows Run, PowerShell, or Terminal.
  3. Command Execution: The user copies and pastes the command, believing they are solving an issue.
  4. Malware Installation: The command silently downloads and installs malware such as Lumma Stealer, DarkGate, or NetSupport RAT.

Image courtesy of Cybersecurity News

The effectiveness of ClickFix lies in its ability to bypass traditional security defenses. Because the user is running the command, antivirus and other security tools often do not flag it as malicious. This is further enhanced by the use of trusted tools like PowerShell and Run, which are built into Windows. More on ClickFix Analysis

Technical Details

A typical ClickFix attack involves the following technical stages:

  • Initial Access: Attackers gain initial access via drive-by downloads from compromised legitimate websites or through social engineering techniques. MITRE ATT&CK® Matrix for Enterprise
  • Execution: Malicious payloads are executed using mshta.exe or PowerShell, often downloading and running a malware dropper. PowerShell
  • Persistence: Persistence is established by creating a file in the Windows Startup folder or modifying Windows Registry keys. Windows Registry key modification
  • Steganography: Some ClickFix campaigns use steganography to hide malicious shellcode within image files, making detection more difficult. steganography
  • Payload Delivery: The final payload often includes info-stealing malware like LummaC2 or Rhadamanthys.

Fake Windows update

Image courtesy of Malwarebytes

Interlock Ransomware and ClickFix

The Interlock ransomware group has been observed using ClickFix as part of its attack chain. Interlock is a financially motivated group that targets businesses and critical infrastructure sectors across North America and Europe. CISA and FBI Warn of Escalating Interlock Ransomware Attacks

Interlock actors have been observed:

  • Obtaining initial access via drive-by downloads from compromised legitimate websites. drive-by download
  • Using ClickFix social engineering to trick users into executing malicious payloads. social engineering technique
  • Employing a double extortion model, encrypting systems after exfiltrating data. double extortion
  • Leveraging tools like Cobalt Strike and SystemBC for command and control.

Defense Strategies

To defend against ClickFix attacks, organizations should implement the following measures:

  • User Education: Train employees to recognize social engineering tactics and avoid running commands from untrusted sources. social engineering
  • Restrict PowerShell Execution: Implement policies to restrict PowerShell execution for standard users, ensuring only signed scripts can run. PowerShell scripts
  • Application Allowlists: Create application allowlists to manage and control software on the network. application allowlists
  • Network Monitoring: Utilize network intrusion detection systems (NIDS) to identify and report malicious events. Albert Network Monitoring and Management
  • Endpoint Protection: Deploy real-time anti-malware solutions with web protection components. anti-malware solution
  • DNS Filtering: Implement domain name system (DNS) filtering to prevent initial access to malicious domains.

Gopher Security's Zero-Trust Architecture

Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity architecture. Our platform converges networking and security across devices, apps, and environments—from endpoints and private networks to cloud, remote access, and containers—using peer-to-peer encrypted tunnels and quantum-resistant cryptography. This architecture is designed to mitigate threats like ClickFix by ensuring that every user, device, and application is authenticated and authorized before accessing any resource, regardless of location.

By implementing domain name system (DNS) filtering and web access firewalls, and training users to spot phishing attempts. Gopher Security provides robust endpoint detection and response (EDR) tooling and capabilities and can uncover hidden red flags of intrusion and can even prevent attackers gaining an initial foothold in the first place.

Gopher Security solutions can significantly reduce the risk of ClickFix attacks by:

  • Verifying User Identity: Ensuring that users are who they claim to be through multi-factor authentication and continuous monitoring.
  • Validating Device Security: Checking that devices meet security requirements before granting access.
  • Limiting Application Access: Restricting application access to only what is necessary for the user's role.
  • Securing Network Connections: Encrypting all network traffic to prevent eavesdropping and data theft.

Mitigations

FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.

Links

Take Action

Protect your organization from advanced social engineering attacks like ClickFix. Contact Gopher Security today to learn more about our AI-powered, post-quantum Zero-Trust cybersecurity solutions and how we can help you build a more secure and resilient infrastructure.

Jim Gagnard
Jim Gagnard

Board Advisor

 

30-year CEO experiences of leading multiple $MM exits. Excellent operator of managing big enterprise companies.

Related News

Google Dismantles IPIDEA, Major Proxy Network for 550+ Threats
Ipidea proxy network

Google Dismantles IPIDEA, Major Proxy Network for 550+ Threats

Google has disrupted Ipidea, a massive residential proxy network used by cybercriminals. Learn how this action impacts online security and what it means for threat actors. Read now!

By Brandon Woo February 27, 2026 4 min read
common.read_full_article
Pentagon Leaders Anticipate Cybercom 2.0 to Counter Chinese Threats
Cybercom 2.0

Pentagon Leaders Anticipate Cybercom 2.0 to Counter Chinese Threats

The Pentagon is overhauling its cyber defenses with Cybercom 2.0. Discover how specialization, AI, and innovation are reshaping the fight against threats like China's Volt Typhoon. Learn more!

By Jim Gagnard February 26, 2026 3 min read
common.read_full_article
FBI Seizes RAMP Ransomware Forum Linked to Cybercrime Operations
RAMP ransomware forum

FBI Seizes RAMP Ransomware Forum Linked to Cybercrime Operations

The FBI has successfully seized RAMP, a major dark web forum used by ransomware gangs. Discover the impact of this takedown on cybercrime operations. Read more!

By Brandon Woo February 23, 2026 3 min read
common.read_full_article
New Britain Ransomware Attack Disrupts City Services, FBI Involved
New Britain cyberattack

New Britain Ransomware Attack Disrupts City Services, FBI Involved

New Britain faces a major ransomware attack disrupting city services. Learn about the ongoing investigation, impact on operations, and essential services. Discover how to enhance your cybersecurity.

By Alan V Gutnov February 20, 2026 3 min read
common.read_full_article