Contact

Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape

NetmanageIT OpenCTI - opencti.netmanageit.com

Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape



SUMMARY :

The ClickFix social engineering technique, which tricks users into copying and running malicious PowerShell commands, has become increasingly prevalent across the threat landscape. Initially observed in campaigns by TA571 and ClearFake, it is now used by multiple threat actors to deliver various malware types. The technique often employs fake error messages or CAPTCHA checks to deceive users. Recent examples include GitHub notification impersonations delivering Lumma Stealer, Swiss-targeted campaigns distributing AsyncRAT, fake software updates deploying NetSupport RAT, and ChatGPT-themed malvertising delivering XWorm. The technique's popularity stems from its effectiveness in bypassing security measures by exploiting users' desire to resolve issues independently.

OPENCTI LABELS :

powershell,social engineering,xworm,darkgate,asyncrat,lumma stealer,brute ratel c4,danabot,latrodectus,cybersecurity,clickfix,netsupport,threat actors,malware delivery,lucky volunteer,recaptcha phish


Open in NetmanageIT OpenCTI Public Instance with below link!


Use public read only username and password on login page.

NOTE : Use Public READ only user credentials on login page banner.


Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape