Malware & RansomwareHIGH

ClickFix Attack - New Malware Technique Uncovered

CSCyber Security News
ClickFixNetSupport RATmacOSWindowsAPT28
🎯

Basically, a new trick makes users run harmful commands on their computers, letting hackers in.

Quick Summary

The ClickFix attack technique is tricking users into running harmful commands on their devices. This method affects Windows and macOS users, posing a significant risk to various industries. Awareness and proactive measures are crucial to prevent these types of malware infections.

What Happened

A social engineering technique known as ClickFix has emerged, targeting users on both Windows and macOS. This method tricks individuals into manually executing malicious commands, leading to the silent installation of malware. Initially documented in late 2023, ClickFix has rapidly evolved into a prevalent tactic among cybercriminals. Instead of exploiting software vulnerabilities, it uses a deceptive interface that mimics trusted services like Cloudflare CAPTCHA or Google reCAPTCHA.

The attack begins with a fake verification screen. Users are prompted to copy a command that is secretly placed on their clipboard via background JavaScript. They are then instructed to paste this command into the Windows Run dialog box or the macOS Terminal, unknowingly granting attackers access to their systems. Recorded Future’s Insikt Group identified five distinct clusters of ClickFix attacks, each utilizing similar deceptive techniques but targeting various sectors, including accounting and travel.

Who's Being Targeted

ClickFix has proven effective across a wide range of industries. The impersonated services include well-known brands like Intuit QuickBooks, Booking.com, and Birdeye. Victims span sectors such as accounting, travel, real estate, and legal services. The method's adaptability makes it a favorite among cybercriminals and potentially state-sponsored actors, including APT28 and North Korea’s PurpleBravo. As this technique continues to evolve, its impact on businesses and individual users could be significant.

Signs of Infection

The ClickFix attack follows a consistent four-stage infection chain. It begins with an obfuscated input, progresses through native system shell execution, pulls payloads from remote servers, and concludes with in-memory execution. This method leaves minimal traces on the infected device, making detection challenging. On Windows, victims are guided to paste a command that launches a hidden PowerShell process. On macOS, the attack similarly uses the Terminal to execute commands that retrieve and run malware like MacSync. Once executed, the malware often establishes persistence by placing shortcuts in the Startup folder, ensuring it reactivates after each reboot.

How to Protect Yourself

To mitigate the risks associated with ClickFix, users and organizations should implement several defensive measures. On Windows, it is advisable to disable the Run dialog box through Group Policy Objects. Implementing PowerShell Constrained Language Mode alongside AppLocker or Windows Defender Application Control policies can help block unauthorized script execution. For macOS users, restricting terminal access through mobile device management and ensuring System Integrity Protection is enabled are critical steps. Additionally, conducting targeted user awareness training focused on manual verification prompt scams can significantly reduce the likelihood of falling victim to such attacks. Regularly updating SIEM and EDR platforms with current threat intelligence is also essential for blocking newly identified command-and-control domains.

🔒 Pro insight: ClickFix's reliance on user execution highlights the need for enhanced user education and robust endpoint security measures to counter social engineering tactics.

Original article from

Cyber Security News · Tushar Subhra Dutta

Read Full Article

Related Pings

HIGHMalware & Ransomware

Coruna Exploit - Evolution of Triangulation iOS Framework

Kaspersky has discovered the Coruna exploit kit, which reuses code from the Operation Triangulation attacks. This poses a significant risk to iOS users. With millions of devices vulnerable, timely updates are crucial to protect sensitive data.

Security Affairs·
HIGHMalware & Ransomware

BPFdoor - Stealth Malware Targets Telecom Networks Worldwide

BPFdoor, a stealthy backdoor, targets telecom networks globally. This malware operates deep within the OS kernel, complicating detection efforts. Security teams must enhance their visibility to combat this threat effectively.

SC Media·
HIGHMalware & Ransomware

VoidLink Rootkit - Advanced Threat to Linux Systems Emerges

The VoidLink rootkit has emerged as a serious threat to Linux systems. This advanced malware uses innovative techniques to hide itself, making detection difficult. Organizations must take action to safeguard their systems against this sophisticated threat.

Cyber Security News·
HIGHMalware & Ransomware

RedLine Malware - Developer Extradited, Faces 30 Years in Prison

Hambardzum Minasyan, a key figure behind RedLine malware, has been extradited to the U.S. He faces serious charges that could lead to a lengthy prison sentence. This case highlights the ongoing battle against cybercrime and the impact of malware on global security.

The Record·
HIGHMalware & Ransomware

Infiniti Stealer - New macOS Infostealer Emerges

A new macOS malware called Infiniti Stealer tricks users into executing malicious commands. This poses serious risks to sensitive data on Macs. Stay safe by avoiding suspicious commands.

Malwarebytes Labs·
HIGHMalware & Ransomware

Malware Alert - Elastic Security Labs Uncovers BRUSHWORM

Elastic Security Labs has discovered two new malware types, BRUSHWORM and BRUSHLOGGER, targeting a South Asian financial institution. These threats use USB drives to spread and steal sensitive data. Organizations must act swiftly to mitigate risks and protect their data.

Elastic Security Labs·