Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

For privacy and security, think carefully before granting AI access to your personal data

Benchmark for Greptile’s Lead Series A lecture, AI Code Reviewer, valued at $100 million, according to sources

Why Y Combinator Startups Working on Windows AI Agents and Get Pivoted

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » The new filefix method appears as a threat following a 517% increase in clickfix attacks
Identity

The new filefix method appears as a threat following a 517% increase in clickfix attacks

userBy userJune 26, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 26, 2025Ravi LakshmananCyber ​​Attacks/Malware Analysis

According to ESET data, ClickFix social engineering tactics as initial access vectors using fake capture validation increased by 517% between the second half of 2024 and the first half of this year.

“The list of threats led by Clickfix attacks grows day by day, including Infostealers, Ransomware, Remot Access Trojans, Cryptominers, exploitation Tools, and even custom malware from nation-state parallel threat actors,” said Director of ESET’s Threat Prevention Lab.

Clickfix employs fake error messages or Captcha validation checks to deceive victims and paste malicious scripts into a Windows Run dialog or Apple MacOS terminal app to run and run, run and run.

Slovak cybersecurity company said the most detections of Clickfix are concentrated in Japan, Peru, Poland, Spain and Slovakia.

The prevalence and effectiveness of this attack method led to ad builders for threat actors who provide Clickfix-Weaponized Landing Pages to other attackers, ESET added.

From Clickfix to FileFix

This development involves security researcher MRD0X demonstrating a proof of concept (POC) to replace FileFix named ClickFix, which means copying and pasting the file path to the user and pasting it into Windows File Explorer.

This technique involves achieving essentially the same as Clickfix, but is achieved in a different way by combining the functionality of File Explorer, which uses the file upload feature of a web browser to execute operating system commands via the address bar.

Cybersecurity

In attack scenarios devised by researchers, threat actors may devise phishing pages. Instead of displaying fake Captcha checks on future targets, the phishing page may present a message that says that the document will be shared and that you need to copy and paste the file path in the address bar by pressing Ctrl+L.

The phishing page also includes the notable “Open File Explorer” that opens File Explorer when clicked and copies malicious PowerShell commands to the user’s clipboard. So, if the victim pastes the “file path”, the attacker’s command will be executed instead.

This is accomplished by changing the copied file path and prep the PowerShell command. It then adds space to hide space from view and pound sign (“#”) and treats fake file paths as comments.

“In addition, the PowerShell command concatenates the dummy file path after the comment to hide the command and display the file path,” MRD0X said.

There are plenty of fishing campaigns

The surge in Clickfix campaigns is also consistent with the discoveries of various phishing campaigns.

Leverage the .gov domain to send phishing emails pose as unpaid tolls and send fake pages designed to use fake pages (LLDS) designed to collect personal and financial information. The shortcut (LNK) file in ZIP Archives launches the PowerShell code responsible for deploying Remcos Rat employment lures. This alerts users that their mailbox is almost full and they need to “clear” them by clicking the button embedded in the message, and that they need to take users to an IPF-hosted phishing page that steals users’ emails. Interestingly, the email also includes RAR archive attachments that, when extracted and executed, drop XWorm malware. Includes a URL that can be used as a PDF document. This contains another URL to drop the ZIP archive. This includes the executable file responsible for starting the car-based Lumma Stealer. Redirect users to the Qualification Harvest page hosted on *.sharepoint to redirect users using SharePoint-themed emails that redirect SMS messages and recipients regarding unpaid toll violations to a deceptive site that harvests personal information and credit card details[.]com “Siphon user’s Microsoft account password is the Siphon user’s domain.

“Emails containing SharePoint links are less likely to be flagged as malicious or phishing by EDR or antivirus software. Users tend to believe that Microsoft links are inherently safe,” CyberProof said.

“Because phishing pages are hosted in SharePoint, they are often dynamic and accessible from a specific link for a limited time, making it difficult to detect automatic crawlers, scanners and sandboxes.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleIndex measurements measure the effect of heat on pedestrian activity
Next Article If you threaten an AI chatbot, it will lie, cheat and warn you to stop you, “Let me die.”
user
  • Website

Related Posts

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

July 18, 2025

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

July 18, 2025

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

July 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

For privacy and security, think carefully before granting AI access to your personal data

Benchmark for Greptile’s Lead Series A lecture, AI Code Reviewer, valued at $100 million, according to sources

Why Y Combinator Startups Working on Windows AI Agents and Get Pivoted

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.