HomeCyber SecurityNew FileFix Methodology Emerges as a Risk Following 517% Rise in ClickFix...

New FileFix Methodology Emerges as a Risk Following 517% Rise in ClickFix Assaults


Jun 26, 2025Ravie LakshmananCyber Assault / Malware Evaluation

New FileFix Methodology Emerges as a Risk Following 517% Rise in ClickFix Assaults

The ClickFix social engineering tactic as an preliminary entry vector utilizing pretend CAPTCHA verifications elevated by 517% between the second half of 2024 and the primary half of this 12 months, in keeping with knowledge from ESET.

“The listing of threats that ClickFix assaults result in is rising by the day, together with infostealers, ransomware, distant entry trojans, cryptominers, post-exploitation instruments, and even customized malware from nation-state-aligned menace actors,” Jiří Kropáč, Director of Risk Prevention Labs at ESET, stated.

ClickFix has develop into a extensively well-liked and misleading technique that employs bogus error messages or CAPTCHA verification checks to entice victims into copying and pasting a malicious script into both the Home windows Run dialog or the Apple macOS Terminal app, and operating it.

The Slovak cybersecurity firm stated the best quantity of ClickFix detections are concentrated round Japan, Peru, Poland, Spain, and Slovakia.

The prevalence and effectiveness of this assault technique have led to menace actors promoting builders that present different attackers with ClickFix-weaponized touchdown pages, ESET added.

From ClickFix to FileFix

The event comes as safety researcher mrd0x demonstrated a proof-of-concept (PoC) different to ClickFix named FileFix that works by tricking customers into copying and pasting a file path into Home windows File Explorer.

The method primarily includes attaining the identical as ClickFix however in a unique method by combining File Explorer’s capability to execute working system instructions by the handle bar with an online browser’s file add function.

Cybersecurity

Within the assault situation devised by the researcher, a menace actor could devise a phishing web page that, as an alternative of displaying a pretend CAPTCHA examine to the possible goal, presents a message stating a doc has been shared with them and that they should copy and paste the file path on the handle bar by urgent CTRL + L.

The phishing web page additionally features a distinguished “Open File Explorer” that, upon clicking, opens the File Explorer and copies a malicious PowerShell command to the consumer’s clipboard. Thus, when the sufferer pastes the “file path,” the attacker’s command is executed as an alternative.

This, in flip, is achieved by altering the copied file path to prepend the PowerShell command earlier than it adopted by including areas to cover it from view and a pound signal (“#”) to deal with the pretend file path as a remark: “Powershell.exe -c ping instance.com# C:decoy.doc

“Moreover, our PowerShell command will concatenate the dummy file path after a remark with a purpose to conceal the command and present the file path as an alternative,” mrd0x stated.

Phishing Campaigns Galore

The surge in ClickFix campaigns additionally coincides with the invention of assorted phishing campaigns in current weeks that –

“Emails containing SharePoint hyperlinks are much less more likely to be flagged as malicious or phishing by EDR or antivirus software program. Customers additionally are typically much less suspicious, believing Microsoft hyperlinks are inherently safer,” CyberProof stated.

“Since phishing pages are hosted on SharePoint, they’re usually dynamic and accessible solely by a particular hyperlink for a restricted time, making them more durable for automated crawlers, scanners, and sandboxes to detect.”

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we submit.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments