JSL’s security team applies a comprehensive view of IT security, integrating assessment, audit, and compliance.
A new wave of cyberattacks is exploiting users’ trust in routine computer processes through a technique known as “ClickFix.” This sophisticated social engineering method tricks victims into manually executing malicious scripts by disguising the attack as a standard verification or troubleshooting procedure.
How ClickFix Works
The ClickFix attack begins when a user encounters what appears to be a technical error or verification requirement. Unlike traditional phishing that relies on malicious links or attachments, ClickFix manipulates users into becoming unwitting accomplices in their own system compromise.
The attack typically unfolds in three stages:
Current Campaign Trends
According to recent analysis by Group-IB, ClickFix campaigns have evolved significantly since their emergence. The technique has been adopted by various threat actors, from cybercriminals to state-sponsored groups.
Proofpoint researchers have identified several nation-state actors employing ClickFix:
Industry-Specific Targeting
The hospitality sector has become a particular focus for ClickFix campaigns. As reported by KrebsOnSecurity, attackers are impersonating Booking.com to target hotel staff with messages about negative reviews or booking inquiries. These campaigns exploit the industry’s customer-service mindset, where employees are conditioned to quickly resolve guest issues.
The KongTuke campaign, active since September 2024, demonstrates the scale of these operations. It uses compromised websites to inject scripts that collect system information before redirecting users to malicious payloads.
Recognition and Prevention
Users should be alert to several red flags:
Legitimate technical support will never ask users to:
Protecting Your Organization
Organizations can implement several measures to combat ClickFix attacks:
The Evolution Continues
What makes ClickFix particularly concerning is its adaptability. Attackers continuously refine their lures, from fake browser updates to document viewing errors. The technique’s success relies not on technical vulnerabilities but on human psychology—our instinct to follow instructions when faced with technical problems.
As Group-IB notes, the variety of ClickFix implementations suggests this technique will remain a persistent threat. Organizations must prepare their users to think critically when encountering any “helpful” error resolution steps, especially those requiring manual command execution.
If you encounter suspicious verification requests or error fixes requiring the Windows + R sequence, stop immediately and contact your IT security team before proceeding.