Around the World in 90 Days: State-Sponsored Actors Try ClickFix
Multiple state-sponsored threat actors from North Korea, Iran, and Russia have been observed adopting the ClickFix social engineering technique, previously associated with cybercriminal activities. Over a three-month period from late 2024 to early 2025, groups such as TA427, TA450, UNK_RemoteRogue, and TA422 incorporated ClickFix into their existing infection chains. The technique involves using dialogue boxes with instructions for targets to copy, paste, and run malicious commands on their machines. While the adoption of ClickFix hasn't revolutionized these groups' campaigns, it has replaced installation and execution stages in their existing processes. This trend highlights the fluidity of tactics among threat actors and the potential for wider adoption of ClickFix by other state-sponsored groups in the future.
AI Analysis
Technical Summary
The threat titled "Around the World in 90 Days: State-Sponsored Actors Try ClickFix" describes the observed adoption of the ClickFix social engineering technique by multiple state-sponsored threat actors originating from North Korea, Iran, and Russia. These groups, including TA427, TA450, UNK_RemoteRogue, and TA422, integrated ClickFix into their existing malware infection chains over a three-month period spanning late 2024 to early 2025. ClickFix is a social engineering method that relies on presenting targets with dialogue boxes containing instructions that prompt users to copy, paste, and execute malicious commands directly on their machines. This technique effectively replaces the traditional installation and execution stages of malware deployment, streamlining the infection process by leveraging user interaction to execute payloads. While ClickFix has been previously associated with cybercriminal groups, its adoption by state-sponsored actors marks a notable shift in tactics, demonstrating the fluidity and adaptability of these actors in evolving their operational methods. The technique is linked with tools such as Metasploit and QuasarRAT, indicating its use in deploying remote access trojans and exploitation frameworks. Despite the integration of ClickFix, the overall campaign strategies of these groups have not fundamentally changed, but the trend suggests a potential for broader adoption of this social engineering approach by other state-sponsored entities in the future. No specific affected software versions or patches are identified, and no known exploits in the wild have been reported. The threat is classified as medium severity, reflecting moderate risk based on current knowledge.
Potential Impact
For European organizations, the adoption of ClickFix by state-sponsored actors poses a significant risk primarily through social engineering vectors that exploit human factors rather than technical vulnerabilities. The technique's reliance on convincing users to execute malicious commands can lead to unauthorized remote access, data exfiltration, espionage, and potential disruption of critical systems. Given the involvement of advanced persistent threat (APT) groups from North Korea, Iran, and Russia, targets may include government agencies, critical infrastructure, defense contractors, and high-value private sector entities. The impact includes potential compromise of confidentiality through data theft, integrity through unauthorized system modifications, and availability if malware payloads disrupt operations. The ease of exploitation depends heavily on user susceptibility to social engineering, making organizations with less mature security awareness programs more vulnerable. The lack of required software vulnerabilities means traditional patch management offers limited protection, emphasizing the need for robust user training and endpoint monitoring. The medium severity rating reflects that while the threat is not currently causing widespread disruption, the potential for targeted, high-impact intrusions exists, especially if the technique is adopted more widely.
Mitigation Recommendations
Mitigation should focus on strengthening defenses against social engineering and unauthorized command execution. Specific recommendations include: 1) Implementing comprehensive, scenario-based security awareness training that educates users on the risks of executing unsolicited commands and recognizing deceptive dialogue boxes. 2) Deploying endpoint protection solutions capable of detecting and blocking suspicious command-line activities and script execution initiated by user actions. 3) Utilizing application control or whitelisting to restrict execution of unauthorized scripts and commands, particularly those initiated via copy-paste from untrusted sources. 4) Enhancing monitoring and logging of command execution events to identify anomalous behavior indicative of ClickFix exploitation. 5) Establishing strict policies that prohibit users from executing commands or scripts received through unsolicited prompts or messages. 6) Conducting regular phishing simulation exercises tailored to mimic ClickFix-style social engineering to improve user resilience. 7) Employing network segmentation and least privilege principles to limit the lateral movement potential if initial compromise occurs. 8) Collaborating with threat intelligence providers to stay informed about evolving tactics and indicators related to ClickFix and associated APT groups.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Poland, Belgium, Sweden, Spain, Finland
Indicators of Compromise
- hash: 06816634fb019b6ed276d36f414f3b36f99b845ddd1015c2b84a34e0b8d7f083
- hash: 07a45c7a436258aa81ed2e770a233350784f5b05538da8a1d51d03c55d9c0875
- hash: 0ff9c4bba39d6f363b9efdfa6b54127925b8c606ecef83a716a97576e288f6dd
- hash: 18ee1393fc2b2c1d56d4d8f94efad583841cdf8766adb95d7f37299692d60d7d
- hash: 78aa2335d3e656256c50f1f2c544b32713790857998068a5fa6dec1fb89aa411
- hash: 85db55aab78103f7c2d536ce79e923c5fd9af14a2683f8bf290993828bddeb50
- hash: 8a8c57eedca1bd03308198a87cae7977d3c385f240c5c62ac7c602126a1a312f
- hash: bfb11abb82ab4c788156df862a5cf4fa085f1ac3203df7a46251373d55cc587c
- hash: e410ffadb3f5b6ca82cece8bce4fb378a43c507e3ba127ef669dbb84e3c73e61
- hash: f9536b1d798bee3af85b9700684b41da67ff9fed79aae018a47af085f75c9e3e
- domain: microsoftonlines.com
- domain: raedom.store
- domain: ukrtelcom.com
- domain: ukrtelecom.com
- domain: ukrtelecom.eu
- domain: account-profile.servepics.com
- domain: accounts-myservice.servepics.com
- domain: accounts-porfile.serveirc.com
- domain: drive.us-dos.securitel.com
- domain: e-securedrive.mofa.mtomtech.co.kr
- domain: freedrive.servehttp.com
- domain: login-accounts.servehttp.com
- domain: mail.ukrtelecom.eu
- domain: myaccounts-profile.servehttp.com
- domain: securedrive-mofa.servehttp.com
- domain: securedrive.fin-tech.com
- domain: securedrive.netsecgroup.com
- domain: securedrive.networkguru.com
- domain: securedrive.opticalize.com
- domain: securedrive.privatedns.org
- domain: securedrive.root.sx
- domain: securedrive.servehttp.com
- domain: undocs.myvnc.com
- domain: undocs.servehttp.com
Around the World in 90 Days: State-Sponsored Actors Try ClickFix
Description
Multiple state-sponsored threat actors from North Korea, Iran, and Russia have been observed adopting the ClickFix social engineering technique, previously associated with cybercriminal activities. Over a three-month period from late 2024 to early 2025, groups such as TA427, TA450, UNK_RemoteRogue, and TA422 incorporated ClickFix into their existing infection chains. The technique involves using dialogue boxes with instructions for targets to copy, paste, and run malicious commands on their machines. While the adoption of ClickFix hasn't revolutionized these groups' campaigns, it has replaced installation and execution stages in their existing processes. This trend highlights the fluidity of tactics among threat actors and the potential for wider adoption of ClickFix by other state-sponsored groups in the future.
AI-Powered Analysis
Technical Analysis
The threat titled "Around the World in 90 Days: State-Sponsored Actors Try ClickFix" describes the observed adoption of the ClickFix social engineering technique by multiple state-sponsored threat actors originating from North Korea, Iran, and Russia. These groups, including TA427, TA450, UNK_RemoteRogue, and TA422, integrated ClickFix into their existing malware infection chains over a three-month period spanning late 2024 to early 2025. ClickFix is a social engineering method that relies on presenting targets with dialogue boxes containing instructions that prompt users to copy, paste, and execute malicious commands directly on their machines. This technique effectively replaces the traditional installation and execution stages of malware deployment, streamlining the infection process by leveraging user interaction to execute payloads. While ClickFix has been previously associated with cybercriminal groups, its adoption by state-sponsored actors marks a notable shift in tactics, demonstrating the fluidity and adaptability of these actors in evolving their operational methods. The technique is linked with tools such as Metasploit and QuasarRAT, indicating its use in deploying remote access trojans and exploitation frameworks. Despite the integration of ClickFix, the overall campaign strategies of these groups have not fundamentally changed, but the trend suggests a potential for broader adoption of this social engineering approach by other state-sponsored entities in the future. No specific affected software versions or patches are identified, and no known exploits in the wild have been reported. The threat is classified as medium severity, reflecting moderate risk based on current knowledge.
Potential Impact
For European organizations, the adoption of ClickFix by state-sponsored actors poses a significant risk primarily through social engineering vectors that exploit human factors rather than technical vulnerabilities. The technique's reliance on convincing users to execute malicious commands can lead to unauthorized remote access, data exfiltration, espionage, and potential disruption of critical systems. Given the involvement of advanced persistent threat (APT) groups from North Korea, Iran, and Russia, targets may include government agencies, critical infrastructure, defense contractors, and high-value private sector entities. The impact includes potential compromise of confidentiality through data theft, integrity through unauthorized system modifications, and availability if malware payloads disrupt operations. The ease of exploitation depends heavily on user susceptibility to social engineering, making organizations with less mature security awareness programs more vulnerable. The lack of required software vulnerabilities means traditional patch management offers limited protection, emphasizing the need for robust user training and endpoint monitoring. The medium severity rating reflects that while the threat is not currently causing widespread disruption, the potential for targeted, high-impact intrusions exists, especially if the technique is adopted more widely.
Mitigation Recommendations
Mitigation should focus on strengthening defenses against social engineering and unauthorized command execution. Specific recommendations include: 1) Implementing comprehensive, scenario-based security awareness training that educates users on the risks of executing unsolicited commands and recognizing deceptive dialogue boxes. 2) Deploying endpoint protection solutions capable of detecting and blocking suspicious command-line activities and script execution initiated by user actions. 3) Utilizing application control or whitelisting to restrict execution of unauthorized scripts and commands, particularly those initiated via copy-paste from untrusted sources. 4) Enhancing monitoring and logging of command execution events to identify anomalous behavior indicative of ClickFix exploitation. 5) Establishing strict policies that prohibit users from executing commands or scripts received through unsolicited prompts or messages. 6) Conducting regular phishing simulation exercises tailored to mimic ClickFix-style social engineering to improve user resilience. 7) Employing network segmentation and least privilege principles to limit the lateral movement potential if initial compromise occurs. 8) Collaborating with threat intelligence providers to stay informed about evolving tactics and indicators related to ClickFix and associated APT groups.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.proofpoint.com/us/blog/threat-insight/around-world-90-days-state-sponsored-actors-try-clickfix"]
- Adversary
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash06816634fb019b6ed276d36f414f3b36f99b845ddd1015c2b84a34e0b8d7f083 | — | |
hash07a45c7a436258aa81ed2e770a233350784f5b05538da8a1d51d03c55d9c0875 | — | |
hash0ff9c4bba39d6f363b9efdfa6b54127925b8c606ecef83a716a97576e288f6dd | — | |
hash18ee1393fc2b2c1d56d4d8f94efad583841cdf8766adb95d7f37299692d60d7d | — | |
hash78aa2335d3e656256c50f1f2c544b32713790857998068a5fa6dec1fb89aa411 | — | |
hash85db55aab78103f7c2d536ce79e923c5fd9af14a2683f8bf290993828bddeb50 | — | |
hash8a8c57eedca1bd03308198a87cae7977d3c385f240c5c62ac7c602126a1a312f | — | |
hashbfb11abb82ab4c788156df862a5cf4fa085f1ac3203df7a46251373d55cc587c | — | |
hashe410ffadb3f5b6ca82cece8bce4fb378a43c507e3ba127ef669dbb84e3c73e61 | — | |
hashf9536b1d798bee3af85b9700684b41da67ff9fed79aae018a47af085f75c9e3e | — |
Domain
Value | Description | Copy |
---|---|---|
domainmicrosoftonlines.com | — | |
domainraedom.store | — | |
domainukrtelcom.com | — | |
domainukrtelecom.com | — | |
domainukrtelecom.eu | — | |
domainaccount-profile.servepics.com | — | |
domainaccounts-myservice.servepics.com | — | |
domainaccounts-porfile.serveirc.com | — | |
domaindrive.us-dos.securitel.com | — | |
domaine-securedrive.mofa.mtomtech.co.kr | — | |
domainfreedrive.servehttp.com | — | |
domainlogin-accounts.servehttp.com | — | |
domainmail.ukrtelecom.eu | — | |
domainmyaccounts-profile.servehttp.com | — | |
domainsecuredrive-mofa.servehttp.com | — | |
domainsecuredrive.fin-tech.com | — | |
domainsecuredrive.netsecgroup.com | — | |
domainsecuredrive.networkguru.com | — | |
domainsecuredrive.opticalize.com | — | |
domainsecuredrive.privatedns.org | — | |
domainsecuredrive.root.sx | — | |
domainsecuredrive.servehttp.com | — | |
domainundocs.myvnc.com | — | |
domainundocs.servehttp.com | — |
Threat ID: 682c992c7960f6956616a0a2
Added to database: 5/20/2025, 3:01:00 PM
Last enriched: 6/19/2025, 5:49:11 PM
Last updated: 8/17/2025, 10:42:25 AM
Views: 21
Related Threats
Fake ChatGPT Desktop App Delivering PipeMagic Backdoor, Microsoft
MediumPhishing Scam with Fake Copyright Notices Drops New Noodlophile Stealer Variant
MediumThreatFox IOCs for 2025-08-17
MediumThreatFox IOCs for 2025-08-16
MediumScammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.