Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • ClickFix Widely Adopted by Cybercriminals, APT Groups
  • Security Week

ClickFix Widely Adopted by Cybercriminals, APT Groups

Ionut Arghire Published: March 14, 2025 | Updated: March 14, 2025 2 min read
0 views

Since August 2024, both state-sponsored hackers and cybercriminals have been adopting a technique called ClickFix to deploy information stealer malware, cybersecurity firm Group-IB reports.

ClickFix is a social engineering technique in which malicious JavaScript code on web pages prompts the user to perform an action that results in the delivery of a malicious payload.

Typically, the user sees a prompt instructing them to perform an update, fix an error, or verify that they are human on a fake reCAPTCHA page containing malicious code.

The malicious JavaScript code copies a command to the clipboard, and the user is instructed to open the Windows Run dialogue by pressing Win+R, paste the clipboard content using the Ctrl+V key combination, and hit Enter.

This causes the malicious command to be executed on the victim’s machine, and a malware payload to be delivered, typically an information stealer such as Lumma, XWorm RAT, VenomRAT, AsyncRAT, and others. In one instance, the final payload was the DarkGate malware.

Group-IB observed threat actors relying on phishing emails, malvertising, and spam messages on forums, social media platforms, and comment sections to direct victims to malicious websites, phishing sites mimicking legitimate services, and compromised websites hosting malicious code associated with ClickFix.

An earlier iteration of the technique was observed in October 2023, disguised as a Cloudflare anti-bot protection prompt. The broad adoption of the more mature technique called ClickFix, however, started in August 2024, and appears to have accelerated since the beginning of 2025.

Hunting for both the fake reCAPTCHA element and for the copy-to-clipboard functionality observed in these attacks, Group-IB identified multiple variants of ClickFix pages that impersonate Google reCAPTCHA, social media sites, Cloudflare bot protection, or claim issues with the user’s browser.

Advertisement. Scroll to continue reading.

All variations work in a similar manner: the user is prompted to click on the ‘I’m not a robot’, ‘Fix it’, or ‘Copy Fix’ prompt, which automatically copies the malicious code to the clipboard, and then to execute the code in the Run dialog.

“The possibilities are endless, and the technique continues to evolve, finding innovative ways to deceive users. As threat actors refine their methods, we can expect even more sophisticated variants to emerge,” Group-IB notes.

The cybersecurity firm observed ClickFix attacks targeting users of websites offering free movies, games, or cracked software, GitHub users, and enterprise users. It also notes that APT groups such as Iran-linked MuddyWater and Russia-linked APT28 have been employing the ClickFix technique in their attacks.

This week, Microsoft warned of attacks against the hospitality sector in North America, Europe, Oceania, and Asia leveraging the ClickFix technique, and Cofense detailed its use in the distribution of the XWorm RAT.

Related: Homebrew macOS Users Targeted With Information Stealer Malware

Related: ‘SteelFox’ Miner and Information Stealer Bundle Emerges

Related: Threat Actors Abuse GitHub to Distribute Multiple Information Stealers

Related: Information Stealer Exploits Windows SmartScreen Bypass

About The Author

Ionut Arghire

See author's posts

Original post here

What do you feel about this?

  • Security Week

Post navigation

Previous: LockBit Ransomware Developer Extradited to US
Next: In Other News: Swiss Breach Disclosure Rules, ESP32 Chip Backdoor Disputed, MassJacker

Author's Other Posts

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers Cybersecurity_News-SecurityWeek.jpg

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

April 15, 2025 0 2
Kidney Dialysis Services Provider DaVita Hit by Ransomware ransomware.jpeg

Kidney Dialysis Services Provider DaVita Hit by Ransomware

April 15, 2025 0 0
Conduent Says Names, Social Security Numbers Stolen in Cyberattack Cybersecurity_News-SecurityWeek.jpg

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

April 15, 2025 0 0
2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches Cybersecurity_News-SecurityWeek.jpg

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

April 15, 2025 0 2

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0 2
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0 2
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0 1

Trending Now

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0
NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions nist-cve.jpg 5
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

April 17, 2026 0 1
Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts europol.jpg 6
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

April 17, 2026 0 0
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation apachemq.jpg 7
  • The Hacker News

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

April 17, 2026 0 0

You may have missed

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
Copyright © 2026 All rights reserved. | MoreNews by AF themes.