Hackers now testing ClickFix attacks against Linux targets

Gandalf_The_Grey

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Forum Veteran
Apr 24, 2016
7,745
6
81,428
8,389
54
The Netherlands
A new campaign employing ClickFix attacks has been spotted targeting both Windows and Linux systems using instructions that make infections on either operating system possible.

ClickFix is a social engineering tactic where fake verification systems or application errors are used to trick website visitors into running console commands that install malware.

These attacks have traditionally targeted Windows systems, prompting targets to execute PowerShell scripts from the Windows Run command, resulting in info-stealer malware infections and even ransomware.

However, a 2024 campaign using bogus Google Meet errors also targeted macOS users.

A more recent campaign spotted by Hunt.io researchers last week is among the first to adapt this social engineering technique for Linux systems.

The attack, which is attributed to the Pakistan-linked threat group APT36 (aka "Transparent Tribe"), utilizes a website that impersonates India's Ministry of Defence with a link to an allegedly official press release.
 
My first resaction to this kind of phish would be "this is not my repsonsibility, you fix your god **** error" Further more, it doesn't make sense; if they can instruct you to fix it, then they can fix the web ocde itself themselves without you. Asking me to open Powershell to fix your problem doesn't make sense at 2 levels.
 
  • Hundred Points
Reactions: Zero Knowledge