Skip to main content

From ClickFix to Command: A Full PowerShell Attack Chain

Medium
Published: Mon Aug 11 2025 (08/11/2025, 15:29:28 UTC)
Source: AlienVault OTX General

Description

A targeted intrusion campaign impacting Israeli organizations has been identified, leveraging compromised internal email infrastructure to distribute phishing messages. The attack uses a multi-stage, PowerShell-based infection chain, culminating in the delivery of a remote access trojan (RAT). Key characteristics include a full PowerShell-based delivery chain, obfuscated payloads, evidence of lateral movement, and potential overlap with MuddyWater campaigns. The attack begins with phishing emails, progresses through a spoofed Microsoft Teams page, and uses social engineering to execute malicious PowerShell commands. The payload retrieves additional data, deploys a RAT, and establishes communication with a command and control server. The campaign demonstrates the effectiveness of living-off-the-land techniques, layered evasion, and adaptive C2 communication.

AI-Powered Analysis

AILast updated: 08/11/2025, 16:03:45 UTC

Technical Analysis

The threat titled "From ClickFix to Command: A Full PowerShell Attack Chain" describes a sophisticated targeted intrusion campaign primarily impacting Israeli organizations. The attack leverages compromised internal email infrastructure to distribute phishing emails that initiate a multi-stage infection chain entirely based on PowerShell scripts. The initial phishing emails lead victims to a spoofed Microsoft Teams page, employing social engineering tactics to trick users into executing malicious PowerShell commands. These commands deploy obfuscated payloads that evade detection and facilitate the retrieval of additional data from the compromised systems. The infection culminates in the deployment of a Remote Access Trojan (RAT), which establishes persistent communication with a command and control (C2) server. The campaign exhibits evidence of lateral movement within the targeted networks, indicating attackers attempt to expand their foothold beyond the initial compromise. The attack chain uses living-off-the-land techniques, leveraging legitimate system tools and processes to avoid detection and layered evasion methods to bypass security controls. The threat actor behind this campaign is linked to MuddyWater, a known advanced persistent threat (APT) group with a history of targeting Middle Eastern organizations. Indicators of compromise include a specific file hash and a malicious domain (pharmacynod.com). The attack techniques correspond to multiple MITRE ATT&CK tactics and techniques such as T1059.001 (PowerShell), T1566 (Phishing), T1071.001 (Web Protocols), and others, highlighting the complexity and stealth of the campaign. No CVE identifiers or known exploits in the wild are associated with this threat, and the severity is assessed as medium by the source.

Potential Impact

For European organizations, this threat poses a significant risk especially to entities with business or strategic ties to Israeli organizations or those with similar email infrastructure and collaboration platforms like Microsoft Teams. The use of phishing and social engineering to initiate the attack chain means that human factors remain a critical vulnerability. Once inside the network, the PowerShell-based infection chain and RAT deployment can lead to unauthorized data access, espionage, disruption of operations, and potential lateral movement to critical systems. The living-off-the-land approach complicates detection and response, increasing the dwell time of attackers. European organizations with insufficient email security, weak endpoint protection, or limited monitoring of PowerShell activity could be vulnerable to similar campaigns, particularly if threat actors adapt the campaign to local targets. The impact includes potential confidentiality breaches, integrity compromise of data, and availability disruptions due to malware activity or subsequent attacker actions. Given the medium severity rating, the threat is serious but may require specific conditions such as successful phishing and user interaction to fully exploit.

Mitigation Recommendations

1. Enhance email security by deploying advanced anti-phishing solutions that include URL rewriting, attachment sandboxing, and anomaly detection to identify and block phishing attempts leveraging internal email infrastructure. 2. Implement strict PowerShell execution policies and enable logging of all PowerShell commands and scripts, with real-time monitoring and alerting for suspicious or obfuscated commands. 3. Conduct regular user awareness training focused on recognizing phishing emails, especially those impersonating trusted collaboration platforms like Microsoft Teams. 4. Employ endpoint detection and response (EDR) solutions capable of detecting living-off-the-land techniques and lateral movement behaviors. 5. Restrict the use of PowerShell to only authorized administrators and enforce application whitelisting to prevent unauthorized script execution. 6. Monitor network traffic for unusual outbound connections to suspicious domains such as pharmacynod.com and block known malicious indicators. 7. Regularly review and harden internal email infrastructure configurations to prevent compromise and unauthorized use. 8. Conduct threat hunting exercises focusing on the MITRE ATT&CK techniques identified in this campaign to proactively detect early signs of compromise. 9. Maintain up-to-date backups and incident response plans tailored to malware and RAT infections to enable rapid recovery.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.fortinet.com/blog/threat-research/clickfix-to-command-a-full-powershell-attack-chain"]
Adversary
MuddyWater
Pulse Id
689a0c58a01e2faa99b998b7
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash46a76b3c7851f30d68ebc6a5584bc099435b0544d8707fff7a9178f46046708b

Domain

ValueDescriptionCopy
domainpharmacynod.com

Threat ID: 689a109fad5a09ad0026aa51

Added to database: 8/11/2025, 3:47:43 PM

Last enriched: 8/11/2025, 4:03:45 PM

Last updated: 8/12/2025, 12:32:36 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats