Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Critical Open VSX Registry Flaws expose millions of developers to supply chain attacks

Jeff Bezos reportedly courts Trump after his release with Musk

People use AI for much less dating than we have been led to believe

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » The new filefix method appears as a threat following a 517% increase in clickfix attacks
Identity

The new filefix method appears as a threat following a 517% increase in clickfix attacks

userBy userJune 26, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 26, 2025Ravi LakshmananCyber ​​Attacks/Malware Analysis

According to ESET data, ClickFix social engineering tactics as initial access vectors using fake capture validation increased by 517% between the second half of 2024 and the first half of this year.

“The list of threats led by Clickfix attacks grows day by day, including Infostealers, Ransomware, Remot Access Trojans, Cryptominers, exploitation Tools, and even custom malware from nation-state parallel threat actors,” said Director of ESET’s Threat Prevention Lab.

Clickfix employs fake error messages or Captcha validation checks to deceive victims and paste malicious scripts into a Windows Run dialog or Apple MacOS terminal app to run and run, run and run.

Slovak cybersecurity company said the most detections of Clickfix are concentrated in Japan, Peru, Poland, Spain and Slovakia.

The prevalence and effectiveness of this attack method led to ad builders for threat actors who provide Clickfix-Weaponized Landing Pages to other attackers, ESET added.

From Clickfix to FileFix

This development involves security researcher MRD0X demonstrating a proof of concept (POC) to replace FileFix named ClickFix, which means copying and pasting the file path to the user and pasting it into Windows File Explorer.

This technique involves achieving essentially the same as Clickfix, but is achieved in a different way by combining the functionality of File Explorer, which uses the file upload feature of a web browser to execute operating system commands via the address bar.

Cybersecurity

In attack scenarios devised by researchers, threat actors may devise phishing pages. Instead of displaying fake Captcha checks on future targets, the phishing page may present a message that says that the document will be shared and that you need to copy and paste the file path in the address bar by pressing Ctrl+L.

The phishing page also includes the notable “Open File Explorer” that opens File Explorer when clicked and copies malicious PowerShell commands to the user’s clipboard. So, if the victim pastes the “file path”, the attacker’s command will be executed instead.

This is accomplished by changing the copied file path and prep the PowerShell command. It then adds space to hide space from view and pound sign (“#”) and treats fake file paths as comments.

“In addition, the PowerShell command concatenates the dummy file path after the comment to hide the command and display the file path,” MRD0X said.

There are plenty of fishing campaigns

The surge in Clickfix campaigns is also consistent with the discoveries of various phishing campaigns.

Leverage the .gov domain to send phishing emails pose as unpaid tolls and send fake pages designed to use fake pages (LLDS) designed to collect personal and financial information. The shortcut (LNK) file in ZIP Archives launches the PowerShell code responsible for deploying Remcos Rat employment lures. This alerts users that their mailbox is almost full and they need to “clear” them by clicking the button embedded in the message, and that they need to take users to an IPF-hosted phishing page that steals users’ emails. Interestingly, the email also includes RAR archive attachments that, when extracted and executed, drop XWorm malware. Includes a URL that can be used as a PDF document. This contains another URL to drop the ZIP archive. This includes the executable file responsible for starting the car-based Lumma Stealer. Redirect users to the Qualification Harvest page hosted on *.sharepoint to redirect users using SharePoint-themed emails that redirect SMS messages and recipients regarding unpaid toll violations to a deceptive site that harvests personal information and credit card details[.]com “Siphon user’s Microsoft account password is the Siphon user’s domain.

“Emails containing SharePoint links are less likely to be flagged as malicious or phishing by EDR or antivirus software. Users tend to believe that Microsoft links are inherently safe,” CyberProof said.

“Because phishing pages are hosted in SharePoint, they are often dynamic and accessible from a specific link for a limited time, making it difficult to detect automatic crawlers, scanners and sandboxes.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhy is the built-in protection in modern data resilience not enough?
Next Article Critical RCE flaws in Cisco ISE and ISE-PIC allow uncertified attackers to gain root access
user
  • Website

Related Posts

Critical Open VSX Registry Flaws expose millions of developers to supply chain attacks

June 26, 2025

Critical RCE flaws in Cisco ISE and ISE-PIC allow uncertified attackers to gain root access

June 26, 2025

Why is the built-in protection in modern data resilience not enough?

June 26, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Critical Open VSX Registry Flaws expose millions of developers to supply chain attacks

Jeff Bezos reportedly courts Trump after his release with Musk

People use AI for much less dating than we have been led to believe

YouTube adds Carousel search results like AI overview

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Digital Twin Revolution: Reshaping Industry 4.0

1-inch rollout expanded bug bounty features rewards up to $500,000

PhysicsX raises $135 million to bring AI-first engineering to aerospace, automobiles and energy

Deadline approach to speaker proposals for OpenSSL Conference 2025 held in Prague

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.