Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Variations of the ClickFix | Kaspersky official blog

0
Medium
Vulnerability
Published: Wed Feb 25 2026 (02/25/2026, 15:14:58 UTC)
Source: Kaspersky Security Blog

Description

The ClickFix technique is a social engineering attack that tricks users into executing malicious commands on their own systems, often leveraging legitimate utilities like PowerShell, mshta. exe, Finger protocol, and nslookup. Attackers use various pretexts such as fake captchas, software activation tutorials, or fake security alerts to convince victims to run these commands, which then download and execute malware including infostealers and remote access Trojans like ModeloRAT. Variants include delivery via DNS lookups, clipboard manipulation, and multi-stage JavaScript payloads targeting cryptocurrency users. The attacks exploit user trust and system utilities to bypass traditional security controls. Mitigations focus on user awareness, blocking risky shortcuts, and deploying advanced detection solutions. The threat is medium severity due to reliance on user interaction but can lead to significant compromise if successful.

AI-Powered Analysis

AILast updated: 02/25/2026, 15:27:54 UTC

Technical Analysis

The ClickFix technique represents a sophisticated social engineering attack vector where adversaries persuade victims to manually execute malicious commands on their computers, effectively running malware with the privileges of the active user. Initially, attackers used simple pretexts such as fixing a problem or passing a captcha, typically involving PowerShell scripts. Over time, attackers have diversified their approach, employing legitimate Windows utilities like mshta.exe to execute HTML applications that fetch and run malicious payloads, and leveraging outdated but supported protocols like Finger (TCP port 79) to download malware scripts. One variant involves convincing users to run commands that perform DNS lookups via nslookup against attacker-controlled DNS servers, which respond with malicious scripts that download further payloads. Another variant uses social engineering to distribute fake browser extensions that crash and prompt users to run commands that launch malware. Additionally, attackers have exploited cryptocurrency enthusiasts by spreading instructions to execute JavaScript in browsers that redirect funds to attacker wallets. These attacks rely heavily on clipboard manipulation, user interaction, and legitimate system tools, making detection challenging. Despite no known exploits in the wild at the time of reporting, the technique's evolution and real-world use cases demonstrate its effectiveness. Defenses include blocking common execution paths like Win+R, enhancing user security awareness, deploying endpoint detection and response (XDR) solutions, and leveraging external threat detection services.

Potential Impact

If successful, ClickFix attacks can lead to significant security breaches including unauthorized remote access, data theft, and malware infection. Since the malicious commands run with the user's privileges, attackers can bypass many traditional security controls that rely on blocking unauthorized code execution. Infostealers can exfiltrate sensitive corporate or personal data, while remote access Trojans enable persistent control over compromised systems. The use of legitimate system utilities complicates detection and response, increasing dwell time and potential damage. Organizations may face operational disruption, financial loss, reputational damage, and regulatory consequences. The multi-stage nature and social engineering complexity mean that even security-aware environments can be vulnerable if users are not adequately trained. Cryptocurrency users are at risk of direct financial theft through JavaScript payloads. Overall, the threat poses a medium to high risk depending on the environment and user behavior.

Mitigation Recommendations

Mitigation requires a multi-layered approach focused on both technical controls and user education. Specifically: 1) Implement strict application control policies to restrict execution of scripting utilities like PowerShell, mshta.exe, and command-line tools unless explicitly required and monitored. 2) Disable or block the Win+R shortcut on corporate devices to prevent easy access to the Run dialog for executing arbitrary commands. 3) Deploy Endpoint Detection and Response (EDR) or Extended Detection and Response (XDR) solutions capable of detecting suspicious use of legitimate utilities and anomalous network connections, including DNS queries to unknown servers. 4) Conduct targeted security awareness training emphasizing the risks of copying and executing commands from untrusted sources, including social engineering tactics involving captchas, fake software activation, or browser extensions. 5) Monitor network traffic for unusual Finger protocol activity or DNS requests to attacker-controlled domains. 6) Use application whitelisting to prevent unauthorized scripts or executables from running. 7) Employ multi-factor authentication and least privilege principles to limit the impact of compromised accounts. 8) Regularly audit and update endpoint security solutions to detect emerging ClickFix variants. 9) Consider external managed detection and response (MDR) services if internal resources are limited. 10) Educate cryptocurrency users about the dangers of executing JavaScript from untrusted sources in browsers.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/clickfix-attack-variations/55340/","fetched":true,"fetchedAt":"2026-02-25T15:27:28.063Z","wordCount":1577}

Threat ID: 699f14e0b7ef31ef0b2d24ea

Added to database: 2/25/2026, 3:27:28 PM

Last enriched: 2/25/2026, 3:27:54 PM

Last updated: 2/25/2026, 8:04:51 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats