The Emerging Technique Threat Actors Use to Dominate Targeted Organizations

The Emerging Technique Threat Actors Use to Dominate Targeted Organizations

Threat actors have increasingly adopted ClickFix, a sophisticated social engineering technique that deceives users into executing malicious commands under the guise of resolving common computer issues like performance lags or pop-up errors.

This method, often delivered via compromised websites, malvertising, YouTube tutorials, or fake tech support forums, relies on clipboard hijacking also known as pastejacking to inject harmful scripts into a victim’s clipboard.

Victims are then instructed to paste and run these commands via Windows shortcuts like Win+R for the Run dialog or Win+X for a terminal, effectively bypassing traditional security controls without exploits, attachments, or direct downloads.

Unit 42 researchers have tracked a surge in ClickFix campaigns, impacting diverse industries including high technology, financial services, manufacturing, and government sectors.

The NetSupport RAT infection chain.

With nearly a dozen incident response cases linked to ClickFix as the initial access vector, this technique has enabled full organizational takeovers, leading to credential theft, data exfiltration, and ransomware deployments.

The payloads vary, from infostealers to remote access trojans (RATs), but all exploit human trust in legitimate-seeming fixes, making detection challenging yet feasible through artifacts like registry keys or event logs.

Prominent Campaigns

Among the most notable 2025 campaigns, attackers distributing NetSupport RAT have leveraged fake DocuSign and Okta pages on domains like docusign.sa[.]com and oktacheck.it[.]com, likely tied to ClearFake infrastructure.

ClickFix Technique
Fake landing page for DocuSign at docusign.sa[.]com.

These lures inject PowerShell commands that download ZIP archives containing legitimate Java components sideloaded with malicious DLLs, ultimately deploying the RAT for endpoint infiltration.

Similarly, Latrodectus malware campaigns, active in March-April, redirect users from compromised sites to verification pages that pastejack PowerShell scripts, downloading JavaScript droppers obfuscated with junk JSON variables.

These execute MSI files dropping Latrodectus as libcef.dll, sideloaded via legitimate binaries, often leading to Lumma Stealer as a follow-on payload.

Lumma Stealer operations, surging in April, use typosquatted domains like iplogger[.]co to deliver MSHTA commands fetching encoded PowerShell scripts, which extract AutoIt-based loaders from CAB files like Boat.pst, harvesting browser credentials for exfiltration to C2 servers such as sumeriavgv[.]digital.

These campaigns demonstrate ClickFix’s adaptability, incorporating new loaders and obfuscation to target sectors like automotive, energy, and IT.

Organizational Defenses

Hunting for ClickFix infections involves scrutinizing Windows artifacts, such as the RunMRU registry key for obfuscated commands or keywords indicating payload downloads, and event logs like Security ID 4688 for suspicious process creations from explorer.exe.

For Win+X variants, correlate elevated PowerShell sessions with object access events or clipboard paste activities.

According to the Report, Palo Alto Networks’ Advanced WildFire, URL Filtering, DNS Security, Cortex XDR, and XSIAM provide robust protection by detecting clipboard injections and behavioral anomalies.

Organizations should prioritize employee awareness training on suspicious lures while implementing endpoint detection and response (EDR) telemetry monitoring.

As ClickFix evolves, proactive measures are essential to counter this global threat, with Unit 42 sharing intelligence via the Cyber Threat Alliance for broader defenses.

Indicators of Compromise (IOCs)

Category Indicator Description
SHA256 (Lumma Stealer) 2bc23b53bb76e59d84b0175e8cba68695a21ed74be9327f0b6ba37edc2daaeef PartyContinued.exe
SHA256 (Lumma Stealer) 06efe89da25a627493ef383f1be58c95c3c89a20ebb4af4696d82e729c75d1a7 Boat.pst (CAB file)
Domains (Lumma Stealer) iplogger[.]co, stuffgull[.]top, sumeriavgv[.]digital, pub-164d8d82c41c4e1b871bc21802a18154.r2[.]dev, etc. Typosquatted and C2 domains
SHA256 (Latrodectus) 5809c889e7507d357e64ea15c7d7b22005dbf246aefdd3329d4a5c58d482e7e1 libcef.dll
SHA256 (Latrodectus) 52e6e819720fede0d12dcc5430ff15f70b5656cbd3d5d251abfc2dcd22783293 PowerShell Downloader
C2 URLs (Latrodectus) hxxps[:]//webbs[.]live/on/, hxxps[:]//diab[.]live/up/, etc. Command-and-control endpoints
SHA256 (NetSupport RAT) 5C762FF1F604E92ECD9FD1DC5D1CB24B3AF4B4E0D25DE462C78F7AC0F897FC2D data_3.bin (XOR encrypted stager)
SHA256 (NetSupport RAT) CBAF513E7FD4322B14ADCC34B34D793D79076AD310925981548E8D3CFF886527 msvcp140.dll (loader)
Domains (NetSupport RAT) oktacheck.it[.]com, docusign.sa[.]com, mh-sns[.]com, lasix20[.]com Fake and C2 domains

Stay Updated on Daily Cybersecurity News. Follow us on Google News, LinkedIn, and X.


Source link