‘Fix Now’ and ‘Bot Verification’ Lures Deliver and Execute Malware

'Fix Now' and 'Bot Verification' Lures Deliver and Execute Malware

A sophisticated browser-based malware delivery method, dubbed ClickFix, has emerged as a significant threat to cybersecurity.

Leveraging deceptive prompts like “Fix Now” and “Bot Verification,” ClickFix tricks users into executing malicious commands by exploiting familiar system actions.

This technique bypasses conventional download workflows, relying on clipboard hijacking and user interaction to stage and execute malware.

Clickfix
Verification prompt seen at soubtcevent[.]com.

The ClickFix Technique: A Breakdown

First observed in mid-2024, ClickFix uses deceptive web pages disguised as system alerts or CAPTCHA challenges to manipulate users into running malware.

The infection process typically unfolds in three steps:

  1. Clipboard Hijacking: Users are instructed to press Windows + R, opening the Run dialog box, followed by Ctrl + V to paste a preloaded command silently copied via JavaScript.
  2. Execution: Pressing Enter executes the payload, often launching mshta.exe or PowerShell to retrieve and run remote scripts.
  3. Payload Delivery: Depending on the variant, the malware may include information stealers or fileless PowerShell commands embedded in Base64-encoded scripts.

According to the Report, this method exploits users’ trust in routine system prompts, making it a low-friction attack vector for cybercriminals.

Real-World Examples of ClickFix

Recent investigations uncovered several domains actively employing ClickFix techniques:

  • Bitcoin-Themed Domains: Sites like soubtcevent[.]com mimic CAPTCHA verification pages and execute Base64-encoded PowerShell scripts upon user interaction. These scripts deliver malware such as Lumma Stealer and CryptBot via ZIP archives containing malicious executables (verify1.exe, verify2.exe).
  • Credential Theft Campaigns: Domains such as timestesol[.]com target Zoho Office Suite credentials by redirecting users to fake login pages after completing a “robot verification” prompt. Hardcoded Telegram bot tokens in the source code suggest stolen credentials are sent directly to attacker-controlled endpoints.
  • Compromised Infrastructure: Websites like riverview-pools[.]com copy PowerShell commands to users’ clipboards, delivering fileless payloads from compromised servers. These payloads further retrieve secondary scripts for staging malware execution.
ClickfixClickfix
Screenshot of the Zoho login present after passing verification.

Indicators of Compromise (IOCs)

To aid defenders in identifying ClickFix-related activity, researchers have compiled critical IOCs from observed domains and files:

DomainIP AddressCountry
soubtcevent[.]com94.181.229[.]250Russia
securedmicrosoft365[.]com20.217.17[.]201Israel
targett[.]top104.16.198[.]133United States
FilenameSHA-256 Hash
verify1.exedad4ecd247efa876faac2e3f67130951b044043ca21c5db6281ba2b8fce7a089
verify2.exe69c513f0ddf4416e0d47f778594fd76b96424359c7e9c2e5585ad0abaaf5dbc0

These observables highlight active infrastructure supporting ClickFix campaigns, enabling defenders to block malicious domains and files proactively.

To combat ClickFix-style attacks, organizations should adopt robust defenses:

  • Monitor clipboard-based execution involving PowerShell or mshta.exe.
  • Deploy endpoint detection tools configured to log unusual script activity and clipboard usage.
  • Block access to domains hosting verification-style lures mimicking CAPTCHA challenges or security prompts.
  • Encourage multi-factor authentication (MFA) to mitigate credential theft risks.

ClickFix represents a growing trend in browser-based attack vectors that exploit user trust through deceptive prompts.

By understanding its behavioral patterns and leveraging IOCs, defenders can strengthen their detection capabilities against this evolving threat landscape.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!


Source link