ClickFix Emerges as Second Most Popular Initial Access Vector
Source report →ClickFix is a rapidly growing social engineering attack pattern that has become one of the most prevalent initial-access vectors in 2024 and 2025, second only to traditional phishing. At its core, ClickFix exploits user trust by embedding seemingly benign links to legitimate services, such as Google Forms, Microsoft SharePoint, or fake software-update pages, which dynamically redirect victims to malicious infrastructure once they engage. This delayed activation effectively evades URL reputation checks, sandbox detonation, and secure email gateway filters. Attackers further enhance credibility by delivering convincing lures like Booking.com invoices, CAPTCHA challenges, or browser error messages. Increasingly, APT groups and cyber crime operators are adopting ClickFix to drive credential harvesting, session token theft, and MFA bypass, making it a high-impact threat for both enterprise and high-value targets. ClickFix has evolved into a "hands-on-keyboard via the victim" tactic. Victims are manipulated into copying malicious PowerShell commands, often surreptitiously preloaded onto their clipboard, and pasting them into a Run dialog or terminal. These commands retrieve second-stage payloads over HTTPS without leaving traditional forensic artifacts such as disk-resident scripts or Mark-of-the-Web tags. This technique bypasses many script-content and endpoint protections, enabling delivery of diverse payloads including infostealers, ransomware, RATs, cryptominers, and more. Given the widespread adoption across crimeware and APT playbooks, technical teams should prioritize behavioral detections for suspicious clipboard operations, out-of-band command execution, and post-click redirects, as well as reinforce user awareness training to recognize these deceptive "fix your browser" or "verify your identity" workflows.
IOCs (16)
Scan your environment for IOCs →DOMAIN 5
doculuma.comfatoreader.comfatoreader.netgamascript.comverdascript.comURL 4
ajsdiaolke.shop/endpointdaslkjfhi2.lol/pagehttp://mylittlecabbage.net/qhsddxnahttps://oazevents.com/loader.htmlMD5 FILE HASH 5
194577a7e20bdcc7afbb718f502c134c602e1f42d73cadcd73338ffbc553d5a29701fec71e5bbec912f69c8ed63ffb6dba21b9cca7e67da5d60a72139c1795d107e0c15adc6fcf6096dd5b0b03c20145171c00afe14100468f18f01876457c8011909c0262563f29d28312baffb7ff027f113512c5a76bab7c5870f348ff778fIP ADDRESS 2
91.222.173.11377.221.157.170Detections
- Detect browser redirects from ad networks to exploit kits or malware delivery pages
- Flag suspicious PowerShell execution — encoded commands, download cradles, or AMSI bypass
- Flag suspicious links in messages that impersonate legitimate services or internal tools
- Detect phishing attempts via email link analysis and sender reputation scoring
- Detect clipboard-to-terminal paste operations containing encoded or obfuscated commands
- Monitor for files that bypass Mark-of-the-Web protections via container formats or ADS manipulation
- Alert on processes accessing browser credential stores, cookies, or session databases
- Detect extraction of web session cookies from browser processes or profile directories
- Monitor for user-initiated execution of untrusted content from email or web downloads
- Track user clicks on URLs that redirect through multiple domains before payload delivery
- Detect file downloads via certutil, bitsadmin, curl, or PowerShell from external URLs
- Flag heavily obfuscated scripts or binaries with high entropy content