Skip to main content

Around the World in 90 Days: State-Sponsored Actors Try ClickFix

Medium
Published: Thu Apr 17 2025 (04/17/2025, 14:57:01 UTC)
Source: AlienVault OTX

Description

Multiple state-sponsored threat actors from North Korea, Iran, and Russia have been observed adopting the ClickFix social engineering technique, previously associated with cybercriminal activities. Over a three-month period from late 2024 to early 2025, groups such as TA427, TA450, UNK_RemoteRogue, and TA422 incorporated ClickFix into their existing infection chains. The technique involves using dialogue boxes with instructions for targets to copy, paste, and run malicious commands on their machines. While the adoption of ClickFix hasn't revolutionized these groups' campaigns, it has replaced installation and execution stages in their existing processes. This trend highlights the fluidity of tactics among threat actors and the potential for wider adoption of ClickFix by other state-sponsored groups in the future.

AI-Powered Analysis

AILast updated: 06/19/2025, 17:49:11 UTC

Technical Analysis

The threat titled "Around the World in 90 Days: State-Sponsored Actors Try ClickFix" describes the observed adoption of the ClickFix social engineering technique by multiple state-sponsored threat actors originating from North Korea, Iran, and Russia. These groups, including TA427, TA450, UNK_RemoteRogue, and TA422, integrated ClickFix into their existing malware infection chains over a three-month period spanning late 2024 to early 2025. ClickFix is a social engineering method that relies on presenting targets with dialogue boxes containing instructions that prompt users to copy, paste, and execute malicious commands directly on their machines. This technique effectively replaces the traditional installation and execution stages of malware deployment, streamlining the infection process by leveraging user interaction to execute payloads. While ClickFix has been previously associated with cybercriminal groups, its adoption by state-sponsored actors marks a notable shift in tactics, demonstrating the fluidity and adaptability of these actors in evolving their operational methods. The technique is linked with tools such as Metasploit and QuasarRAT, indicating its use in deploying remote access trojans and exploitation frameworks. Despite the integration of ClickFix, the overall campaign strategies of these groups have not fundamentally changed, but the trend suggests a potential for broader adoption of this social engineering approach by other state-sponsored entities in the future. No specific affected software versions or patches are identified, and no known exploits in the wild have been reported. The threat is classified as medium severity, reflecting moderate risk based on current knowledge.

Potential Impact

For European organizations, the adoption of ClickFix by state-sponsored actors poses a significant risk primarily through social engineering vectors that exploit human factors rather than technical vulnerabilities. The technique's reliance on convincing users to execute malicious commands can lead to unauthorized remote access, data exfiltration, espionage, and potential disruption of critical systems. Given the involvement of advanced persistent threat (APT) groups from North Korea, Iran, and Russia, targets may include government agencies, critical infrastructure, defense contractors, and high-value private sector entities. The impact includes potential compromise of confidentiality through data theft, integrity through unauthorized system modifications, and availability if malware payloads disrupt operations. The ease of exploitation depends heavily on user susceptibility to social engineering, making organizations with less mature security awareness programs more vulnerable. The lack of required software vulnerabilities means traditional patch management offers limited protection, emphasizing the need for robust user training and endpoint monitoring. The medium severity rating reflects that while the threat is not currently causing widespread disruption, the potential for targeted, high-impact intrusions exists, especially if the technique is adopted more widely.

Mitigation Recommendations

Mitigation should focus on strengthening defenses against social engineering and unauthorized command execution. Specific recommendations include: 1) Implementing comprehensive, scenario-based security awareness training that educates users on the risks of executing unsolicited commands and recognizing deceptive dialogue boxes. 2) Deploying endpoint protection solutions capable of detecting and blocking suspicious command-line activities and script execution initiated by user actions. 3) Utilizing application control or whitelisting to restrict execution of unauthorized scripts and commands, particularly those initiated via copy-paste from untrusted sources. 4) Enhancing monitoring and logging of command execution events to identify anomalous behavior indicative of ClickFix exploitation. 5) Establishing strict policies that prohibit users from executing commands or scripts received through unsolicited prompts or messages. 6) Conducting regular phishing simulation exercises tailored to mimic ClickFix-style social engineering to improve user resilience. 7) Employing network segmentation and least privilege principles to limit the lateral movement potential if initial compromise occurs. 8) Collaborating with threat intelligence providers to stay informed about evolving tactics and indicators related to ClickFix and associated APT groups.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.proofpoint.com/us/blog/threat-insight/around-world-90-days-state-sponsored-actors-try-clickfix"]
Adversary

Indicators of Compromise

Hash

ValueDescriptionCopy
hash06816634fb019b6ed276d36f414f3b36f99b845ddd1015c2b84a34e0b8d7f083
hash07a45c7a436258aa81ed2e770a233350784f5b05538da8a1d51d03c55d9c0875
hash0ff9c4bba39d6f363b9efdfa6b54127925b8c606ecef83a716a97576e288f6dd
hash18ee1393fc2b2c1d56d4d8f94efad583841cdf8766adb95d7f37299692d60d7d
hash78aa2335d3e656256c50f1f2c544b32713790857998068a5fa6dec1fb89aa411
hash85db55aab78103f7c2d536ce79e923c5fd9af14a2683f8bf290993828bddeb50
hash8a8c57eedca1bd03308198a87cae7977d3c385f240c5c62ac7c602126a1a312f
hashbfb11abb82ab4c788156df862a5cf4fa085f1ac3203df7a46251373d55cc587c
hashe410ffadb3f5b6ca82cece8bce4fb378a43c507e3ba127ef669dbb84e3c73e61
hashf9536b1d798bee3af85b9700684b41da67ff9fed79aae018a47af085f75c9e3e

Domain

ValueDescriptionCopy
domainmicrosoftonlines.com
domainraedom.store
domainukrtelcom.com
domainukrtelecom.com
domainukrtelecom.eu
domainaccount-profile.servepics.com
domainaccounts-myservice.servepics.com
domainaccounts-porfile.serveirc.com
domaindrive.us-dos.securitel.com
domaine-securedrive.mofa.mtomtech.co.kr
domainfreedrive.servehttp.com
domainlogin-accounts.servehttp.com
domainmail.ukrtelecom.eu
domainmyaccounts-profile.servehttp.com
domainsecuredrive-mofa.servehttp.com
domainsecuredrive.fin-tech.com
domainsecuredrive.netsecgroup.com
domainsecuredrive.networkguru.com
domainsecuredrive.opticalize.com
domainsecuredrive.privatedns.org
domainsecuredrive.root.sx
domainsecuredrive.servehttp.com
domainundocs.myvnc.com
domainundocs.servehttp.com

Threat ID: 682c992c7960f6956616a0a2

Added to database: 5/20/2025, 3:01:00 PM

Last enriched: 6/19/2025, 5:49:11 PM

Last updated: 8/17/2025, 10:42:25 AM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats