Around the World in 90 Days: State-Sponsored Actors Try ClickFix
Multiple state-sponsored threat actors from North Korea, Iran, and Russia have been observed adopting the ClickFix social engineering technique, previously associated with cybercriminal activities. Over a three-month period from late 2024 to early 2025, groups such as TA427, TA450, UNK_RemoteRogue, and TA422 incorporated ClickFix into their existing infection chains. The technique involves using dialogue boxes with instructions for targets to copy, paste, and run malicious commands on their machines. While the adoption of ClickFix hasn't revolutionized these groups' campaigns, it has replaced installation and execution stages in their existing processes. This trend highlights the fluidity of tactics among threat actors and the potential for wider adoption of ClickFix by other state-sponsored groups in the future.
AI Analysis
Technical Summary
The threat titled "Around the World in 90 Days: State-Sponsored Actors Try ClickFix" describes the observed adoption of the ClickFix social engineering technique by multiple state-sponsored threat actors originating from North Korea, Iran, and Russia. These groups, including TA427, TA450, UNK_RemoteRogue, and TA422, integrated ClickFix into their existing malware infection chains over a three-month period spanning late 2024 to early 2025. ClickFix is a social engineering method that relies on presenting targets with dialogue boxes containing instructions that prompt users to copy, paste, and execute malicious commands directly on their machines. This technique effectively replaces the traditional installation and execution stages of malware deployment, streamlining the infection process by leveraging user interaction to execute payloads. While ClickFix has been previously associated with cybercriminal groups, its adoption by state-sponsored actors marks a notable shift in tactics, demonstrating the fluidity and adaptability of these actors in evolving their operational methods. The technique is linked with tools such as Metasploit and QuasarRAT, indicating its use in deploying remote access trojans and exploitation frameworks. Despite the integration of ClickFix, the overall campaign strategies of these groups have not fundamentally changed, but the trend suggests a potential for broader adoption of this social engineering approach by other state-sponsored entities in the future. No specific affected software versions or patches are identified, and no known exploits in the wild have been reported. The threat is classified as medium severity, reflecting moderate risk based on current knowledge.
Potential Impact
For European organizations, the adoption of ClickFix by state-sponsored actors poses a significant risk primarily through social engineering vectors that exploit human factors rather than technical vulnerabilities. The technique's reliance on convincing users to execute malicious commands can lead to unauthorized remote access, data exfiltration, espionage, and potential disruption of critical systems. Given the involvement of advanced persistent threat (APT) groups from North Korea, Iran, and Russia, targets may include government agencies, critical infrastructure, defense contractors, and high-value private sector entities. The impact includes potential compromise of confidentiality through data theft, integrity through unauthorized system modifications, and availability if malware payloads disrupt operations. The ease of exploitation depends heavily on user susceptibility to social engineering, making organizations with less mature security awareness programs more vulnerable. The lack of required software vulnerabilities means traditional patch management offers limited protection, emphasizing the need for robust user training and endpoint monitoring. The medium severity rating reflects that while the threat is not currently causing widespread disruption, the potential for targeted, high-impact intrusions exists, especially if the technique is adopted more widely.
Mitigation Recommendations
Mitigation should focus on strengthening defenses against social engineering and unauthorized command execution. Specific recommendations include: 1) Implementing comprehensive, scenario-based security awareness training that educates users on the risks of executing unsolicited commands and recognizing deceptive dialogue boxes. 2) Deploying endpoint protection solutions capable of detecting and blocking suspicious command-line activities and script execution initiated by user actions. 3) Utilizing application control or whitelisting to restrict execution of unauthorized scripts and commands, particularly those initiated via copy-paste from untrusted sources. 4) Enhancing monitoring and logging of command execution events to identify anomalous behavior indicative of ClickFix exploitation. 5) Establishing strict policies that prohibit users from executing commands or scripts received through unsolicited prompts or messages. 6) Conducting regular phishing simulation exercises tailored to mimic ClickFix-style social engineering to improve user resilience. 7) Employing network segmentation and least privilege principles to limit the lateral movement potential if initial compromise occurs. 8) Collaborating with threat intelligence providers to stay informed about evolving tactics and indicators related to ClickFix and associated APT groups.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Poland, Belgium, Sweden, Spain, Finland
Indicators of Compromise
- hash: 06816634fb019b6ed276d36f414f3b36f99b845ddd1015c2b84a34e0b8d7f083
- hash: 07a45c7a436258aa81ed2e770a233350784f5b05538da8a1d51d03c55d9c0875
- hash: 0ff9c4bba39d6f363b9efdfa6b54127925b8c606ecef83a716a97576e288f6dd
- hash: 18ee1393fc2b2c1d56d4d8f94efad583841cdf8766adb95d7f37299692d60d7d
- hash: 78aa2335d3e656256c50f1f2c544b32713790857998068a5fa6dec1fb89aa411
- hash: 85db55aab78103f7c2d536ce79e923c5fd9af14a2683f8bf290993828bddeb50
- hash: 8a8c57eedca1bd03308198a87cae7977d3c385f240c5c62ac7c602126a1a312f
- hash: bfb11abb82ab4c788156df862a5cf4fa085f1ac3203df7a46251373d55cc587c
- hash: e410ffadb3f5b6ca82cece8bce4fb378a43c507e3ba127ef669dbb84e3c73e61
- hash: f9536b1d798bee3af85b9700684b41da67ff9fed79aae018a47af085f75c9e3e
- domain: microsoftonlines.com
- domain: raedom.store
- domain: ukrtelcom.com
- domain: ukrtelecom.com
- domain: ukrtelecom.eu
- domain: account-profile.servepics.com
- domain: accounts-myservice.servepics.com
- domain: accounts-porfile.serveirc.com
- domain: drive.us-dos.securitel.com
- domain: e-securedrive.mofa.mtomtech.co.kr
- domain: freedrive.servehttp.com
- domain: login-accounts.servehttp.com
- domain: mail.ukrtelecom.eu
- domain: myaccounts-profile.servehttp.com
- domain: securedrive-mofa.servehttp.com
- domain: securedrive.fin-tech.com
- domain: securedrive.netsecgroup.com
- domain: securedrive.networkguru.com
- domain: securedrive.opticalize.com
- domain: securedrive.privatedns.org
- domain: securedrive.root.sx
- domain: securedrive.servehttp.com
- domain: undocs.myvnc.com
- domain: undocs.servehttp.com
Around the World in 90 Days: State-Sponsored Actors Try ClickFix
Description
Multiple state-sponsored threat actors from North Korea, Iran, and Russia have been observed adopting the ClickFix social engineering technique, previously associated with cybercriminal activities. Over a three-month period from late 2024 to early 2025, groups such as TA427, TA450, UNK_RemoteRogue, and TA422 incorporated ClickFix into their existing infection chains. The technique involves using dialogue boxes with instructions for targets to copy, paste, and run malicious commands on their machines. While the adoption of ClickFix hasn't revolutionized these groups' campaigns, it has replaced installation and execution stages in their existing processes. This trend highlights the fluidity of tactics among threat actors and the potential for wider adoption of ClickFix by other state-sponsored groups in the future.
AI-Powered Analysis
Technical Analysis
The threat titled "Around the World in 90 Days: State-Sponsored Actors Try ClickFix" describes the observed adoption of the ClickFix social engineering technique by multiple state-sponsored threat actors originating from North Korea, Iran, and Russia. These groups, including TA427, TA450, UNK_RemoteRogue, and TA422, integrated ClickFix into their existing malware infection chains over a three-month period spanning late 2024 to early 2025. ClickFix is a social engineering method that relies on presenting targets with dialogue boxes containing instructions that prompt users to copy, paste, and execute malicious commands directly on their machines. This technique effectively replaces the traditional installation and execution stages of malware deployment, streamlining the infection process by leveraging user interaction to execute payloads. While ClickFix has been previously associated with cybercriminal groups, its adoption by state-sponsored actors marks a notable shift in tactics, demonstrating the fluidity and adaptability of these actors in evolving their operational methods. The technique is linked with tools such as Metasploit and QuasarRAT, indicating its use in deploying remote access trojans and exploitation frameworks. Despite the integration of ClickFix, the overall campaign strategies of these groups have not fundamentally changed, but the trend suggests a potential for broader adoption of this social engineering approach by other state-sponsored entities in the future. No specific affected software versions or patches are identified, and no known exploits in the wild have been reported. The threat is classified as medium severity, reflecting moderate risk based on current knowledge.
Potential Impact
For European organizations, the adoption of ClickFix by state-sponsored actors poses a significant risk primarily through social engineering vectors that exploit human factors rather than technical vulnerabilities. The technique's reliance on convincing users to execute malicious commands can lead to unauthorized remote access, data exfiltration, espionage, and potential disruption of critical systems. Given the involvement of advanced persistent threat (APT) groups from North Korea, Iran, and Russia, targets may include government agencies, critical infrastructure, defense contractors, and high-value private sector entities. The impact includes potential compromise of confidentiality through data theft, integrity through unauthorized system modifications, and availability if malware payloads disrupt operations. The ease of exploitation depends heavily on user susceptibility to social engineering, making organizations with less mature security awareness programs more vulnerable. The lack of required software vulnerabilities means traditional patch management offers limited protection, emphasizing the need for robust user training and endpoint monitoring. The medium severity rating reflects that while the threat is not currently causing widespread disruption, the potential for targeted, high-impact intrusions exists, especially if the technique is adopted more widely.
Mitigation Recommendations
Mitigation should focus on strengthening defenses against social engineering and unauthorized command execution. Specific recommendations include: 1) Implementing comprehensive, scenario-based security awareness training that educates users on the risks of executing unsolicited commands and recognizing deceptive dialogue boxes. 2) Deploying endpoint protection solutions capable of detecting and blocking suspicious command-line activities and script execution initiated by user actions. 3) Utilizing application control or whitelisting to restrict execution of unauthorized scripts and commands, particularly those initiated via copy-paste from untrusted sources. 4) Enhancing monitoring and logging of command execution events to identify anomalous behavior indicative of ClickFix exploitation. 5) Establishing strict policies that prohibit users from executing commands or scripts received through unsolicited prompts or messages. 6) Conducting regular phishing simulation exercises tailored to mimic ClickFix-style social engineering to improve user resilience. 7) Employing network segmentation and least privilege principles to limit the lateral movement potential if initial compromise occurs. 8) Collaborating with threat intelligence providers to stay informed about evolving tactics and indicators related to ClickFix and associated APT groups.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.proofpoint.com/us/blog/threat-insight/around-world-90-days-state-sponsored-actors-try-clickfix"]
- Adversary
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash06816634fb019b6ed276d36f414f3b36f99b845ddd1015c2b84a34e0b8d7f083 | — | |
hash07a45c7a436258aa81ed2e770a233350784f5b05538da8a1d51d03c55d9c0875 | — | |
hash0ff9c4bba39d6f363b9efdfa6b54127925b8c606ecef83a716a97576e288f6dd | — | |
hash18ee1393fc2b2c1d56d4d8f94efad583841cdf8766adb95d7f37299692d60d7d | — | |
hash78aa2335d3e656256c50f1f2c544b32713790857998068a5fa6dec1fb89aa411 | — | |
hash85db55aab78103f7c2d536ce79e923c5fd9af14a2683f8bf290993828bddeb50 | — | |
hash8a8c57eedca1bd03308198a87cae7977d3c385f240c5c62ac7c602126a1a312f | — | |
hashbfb11abb82ab4c788156df862a5cf4fa085f1ac3203df7a46251373d55cc587c | — | |
hashe410ffadb3f5b6ca82cece8bce4fb378a43c507e3ba127ef669dbb84e3c73e61 | — | |
hashf9536b1d798bee3af85b9700684b41da67ff9fed79aae018a47af085f75c9e3e | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainmicrosoftonlines.com | — | |
domainraedom.store | — | |
domainukrtelcom.com | — | |
domainukrtelecom.com | — | |
domainukrtelecom.eu | — | |
domainaccount-profile.servepics.com | — | |
domainaccounts-myservice.servepics.com | — | |
domainaccounts-porfile.serveirc.com | — | |
domaindrive.us-dos.securitel.com | — | |
domaine-securedrive.mofa.mtomtech.co.kr | — | |
domainfreedrive.servehttp.com | — | |
domainlogin-accounts.servehttp.com | — | |
domainmail.ukrtelecom.eu | — | |
domainmyaccounts-profile.servehttp.com | — | |
domainsecuredrive-mofa.servehttp.com | — | |
domainsecuredrive.fin-tech.com | — | |
domainsecuredrive.netsecgroup.com | — | |
domainsecuredrive.networkguru.com | — | |
domainsecuredrive.opticalize.com | — | |
domainsecuredrive.privatedns.org | — | |
domainsecuredrive.root.sx | — | |
domainsecuredrive.servehttp.com | — | |
domainundocs.myvnc.com | — | |
domainundocs.servehttp.com | — |
Threat ID: 682c992c7960f6956616a0a2
Added to database: 5/20/2025, 3:01:00 PM
Last enriched: 6/19/2025, 5:49:11 PM
Last updated: 11/22/2025, 2:31:54 PM
Views: 81
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-11-21
MediumAPT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains
MediumSyncro + Lovable: RAT delivery via AI-generated websites | Kaspersky official blog
MediumNew Sturnus Android Malware Reads WhatsApp, Telegram, Signal Chats via Accessibility Abuse
MediumChinese Cyberspies Deploy ‘BadAudio’ Malware via Supply Chain Attacks
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.