Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Putin proposes Russia and Ukrainian talk directly in Istanbul on May 15 | News of the Russian-Ukrainian War

Founders and Indie Hackers: Are potential buyers find your product at every stage of their search journey?

Tufts University student returns to Boston after being released from Louisiana Detention Center

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » State-sponsored hackers weaponize Clickfix tactics with targeted malware campaigns
Identity

State-sponsored hackers weaponize Clickfix tactics with targeted malware campaigns

userBy userApril 17, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

State sponsored hackers

It has been found that hacking groups sponsored by multiple states in Iran, North Korea and Russia are leveraging the increasingly popular Clickfix social engineering tactics to deploy malware for three months from the second half of 2024 to the beginning of 2025 and the beginning of 2025.

The phishing campaigns employing the strategy are attributed to clusters tracked as TA427 (aka Kimsky), TA450 (aka Muddywater), UNK_Remoterogue, and TA422 (aka APT28).

Although Clickfix was an early access method that primarily partners with cybercrime groups, the effectiveness of the approach has also been adopted by nation-state groups.

“The incorporation of Clickfix replaces the installation and execution stages of existing infection chains rather than revolutionizing the campaigns carried out by TA427, TA450, UNK_REMOTEROGUE and TA422.”

Clickfix, in a nutshell, refers to a sly technique that encourages users to infect their machines following a set of instructions to copy, paste and execute malicious commands under the pretext of fixing issues, completing Captcha verification, or registering the device.

Cybersecurity

Proofpoint said it first detected Kimsuky using Clickfix in January 2025 and February 2025 as part of a phishing campaign targeting individuals from less than five organizations in the think tank sector.

“TA427 first contacted the target through a meeting request from a spoofed sender delivered to a traditional TA427 target working on the North Korean issue,” the Proofpoint Research team said.

ClickFix tactics for targeted malware campaignsTA427 Clickfix infection chain

“After a brief conversation to engage with the target and build trust, as is common in TA427 activities, the attacker pointed the target to an attacker-controlled site and convinced the target to run a PowerShell command.”

The company explained that the attack chain has launched a multi-stage sequence that culminated in the deployment of an open source remote access trojan named Quasar Rat.

The email message claimed it came from a Japanese diplomat and asked the recipients to arrange a meeting with the Japanese ambassador. During the conversation, threat actors sent malicious PDFs containing links to another document containing a list of questions to be discussed during the meeting.

ClickFix tactics for targeted malware campaignsTA450 Clickfix infection chain

When you click on the link, the victim will be directed to a fake landing page that mimics the Japanese Embassy website and to download the survey.[Windows Run]I’ve asked to copy and paste the command into the dialog to register the device.

“The Clickfix PowerShell command retrieves and executes a second remotely hosted PowerShell command, which showed the decoy PDF (Questionnaire.pdf) referenced earlier in the chain,” Proofpoint said. “The document claimed to be from the Japanese Ministry of Foreign Affairs and included questions regarding nuclear proliferation and policy in Northeast Asia.”

The second PowerShell script is configured to create a visual basic script that is run every 19 minutes by scheduled tasks. This will download two batch scripts that create, decode and execute the Quasar rat payload. It is worth pointing out that this variant of the attack chain was previously documented by Microsoft in February 2025.

ClickFix tactics for targeted malware campaignsUNK_REMOTEROGUE Clickfix Infection Chain

The second nation-state group latching to Clickfix is ​​an Iran-related muddy group that utilizes methods to legitimate remote monitoring and management (RMM) software, such as the level to maintain sustainable access.

Phishing emails sent on November 13th and 14th, 2024, coincided with Tuesday’s patch update, spoofing a Tech Giant security update, asking message recipients to follow Clickfix-style instructions to address the vulnerability.

“The attacker deployed the Clickfix technique by persuading the target to run PowerShell first with administrator privileges and copying and running the commands contained in the email body,” ProofPoint said.

“This command was responsible for installing Remote Management and Monitoring (RMM) software. In this case, the level – then the TA450 operator will exploit the RMM tool to spy and remove data from the target machine.”

Cybersecurity

The TA450 Clickfix campaign is said to target the finance, government, health, education and transportation sectors with an emphasis on the United Arab Emirates (UAE) and Saudi Arabia, as well as the United Arab Emirates (UAE) and Saudi Arabia in Canada, Germany, Switzerland and the United States.

Also on board the Clickfix Bandwagon is a Russian group suspected of being a Russian group tracked as UNK_Remoterogue late last year using lure mail sent from a compromised Zimbra server containing a link to Microsoft Office documents.

Standard Campaign and Clickfix Sighting Timeline (July 2024 – March 2025)

When I visited the link I was presented with a page containing instructions to copy the code from my browser to the terminal, and also showed how the YouTube video tutorial could run PowerShell. The PowerShell commands were equipped with the ability to run JavaScript to run PowerShell code linked to the Empire Command-and-Control (C2) framework.

Proofpoint said the campaign sent 10 messages to individuals from two organizations associated with the leading weapons manufacturers in the defense industry. UNK_Remoterogue is also known to share another phishing campaign and infrastructure overlap with defense and aerospace entities that have links to ongoing conflicts in Ukraine to harvest webmail qualifications via fake login pages.

“Several examples of state-sponsored actors using Clickfix show that not only the popularity of techniques among state actors, but also the use of different countries within weeks of each other,” the company said. “While it’s not a permanent technique, it’s possible that more threat actors from North Korea, Iran and Russia have also tried and tested Clickfix or May in the near future.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleArtificial Intelligence – What’s all the fuss?
Next Article Review: Park Gate Hotel’s mailrooms will be added to the top-notch attendee experience
user
  • Website

Related Posts

Google pays $1.375 billion to Texas for fraudulent tracking and collection of biometric data

May 10, 2025

Germany shuts down more than $1.9 billion in laundry, seizing 34 million euros and 8TB of data using crypto

May 10, 2025

Breaking: EOL system dismantled in the US using 7,000 device proxy botnet IoT

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Putin proposes Russia and Ukrainian talk directly in Istanbul on May 15 | News of the Russian-Ukrainian War

Founders and Indie Hackers: Are potential buyers find your product at every stage of their search journey?

Tufts University student returns to Boston after being released from Louisiana Detention Center

Google pays Texas with $1.375 billion in the country’s largest data privacy payment

Trending Posts

Putin proposes Russia and Ukrainian talk directly in Istanbul on May 15 | News of the Russian-Ukrainian War

May 11, 2025

Israeli protesters in Tel Aviv demand end of war with Gaza | Israeli-Palestinian conflict news

May 10, 2025

Mayor Newark denies trespassing at US Immigration Center after arrest | Political News

May 10, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Founders and Indie Hackers: Are potential buyers find your product at every stage of their search journey?

Google pays Texas with $1.375 billion in the country’s largest data privacy payment

Former Northvolt CEO Peter Carlson secures funding for the company’s new AI manufacturing startup after bankruptcy

Celsius founder Alex Masski has been sentenced to 12 years in a crypto fraud that was ordered to pay $48 million

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.