← All briefs
high September 14, 2025

ClickFix Emerges as Second Most Popular Initial Access Vector

Source report →

ClickFix is a rapidly growing social engineering attack pattern that has become one of the most prevalent initial-access vectors in 2024 and 2025, second only to traditional phishing. At its core, ClickFix exploits user trust by embedding seemingly benign links to legitimate services, such as Google Forms, Microsoft SharePoint, or fake software-update pages, which dynamically redirect victims to malicious infrastructure once they engage. This delayed activation effectively evades URL reputation checks, sandbox detonation, and secure email gateway filters. Attackers further enhance credibility by delivering convincing lures like Booking.com invoices, CAPTCHA challenges, or browser error messages. Increasingly, APT groups and cyber crime operators are adopting ClickFix to drive credential harvesting, session token theft, and MFA bypass, making it a high-impact threat for both enterprise and high-value targets. ClickFix has evolved into a "hands-on-keyboard via the victim" tactic. Victims are manipulated into copying malicious PowerShell commands, often surreptitiously preloaded onto their clipboard, and pasting them into a Run dialog or terminal. These commands retrieve second-stage payloads over HTTPS without leaving traditional forensic artifacts such as disk-resident scripts or Mark-of-the-Web tags. This technique bypasses many script-content and endpoint protections, enabling delivery of diverse payloads including infostealers, ransomware, RATs, cryptominers, and more. Given the widespread adoption across crimeware and APT playbooks, technical teams should prioritize behavioral detections for suspicious clipboard operations, out-of-band command execution, and post-click redirects, as well as reinforce user awareness training to recognize these deceptive "fix your browser" or "verify your identity" workflows.

DOMAIN 5
doculuma.com
fatoreader.com
fatoreader.net
gamascript.com
verdascript.com
URL 4
ajsdiaolke.shop/endpoint
daslkjfhi2.lol/page
http://mylittlecabbage.net/qhsddxna
https://oazevents.com/loader.html
MD5 FILE HASH 5
194577a7e20bdcc7afbb718f502c134c
602e1f42d73cadcd73338ffbc553d5a2
9701fec71e5bbec912f69c8ed63ffb6dba21b9cca7e67da5d60a72139c1795d1
07e0c15adc6fcf6096dd5b0b03c20145171c00afe14100468f18f01876457c80
11909c0262563f29d28312baffb7ff027f113512c5a76bab7c5870f348ff778f
IP ADDRESS 2
91.222.173.113
77.221.157.170

Detections

Additional detection ideas (12)
  • Detect browser redirects from ad networks to exploit kits or malware delivery pages
  • Flag suspicious PowerShell execution — encoded commands, download cradles, or AMSI bypass
  • Flag suspicious links in messages that impersonate legitimate services or internal tools
  • Detect phishing attempts via email link analysis and sender reputation scoring
  • Detect clipboard-to-terminal paste operations containing encoded or obfuscated commands
  • Monitor for files that bypass Mark-of-the-Web protections via container formats or ADS manipulation
  • Alert on processes accessing browser credential stores, cookies, or session databases
  • Detect extraction of web session cookies from browser processes or profile directories
  • Monitor for user-initiated execution of untrusted content from email or web downloads
  • Track user clicks on URLs that redirect through multiple domains before payload delivery
  • Detect file downloads via certutil, bitsadmin, curl, or PowerShell from external URLs
  • Flag heavily obfuscated scripts or binaries with high entropy content