Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Upgraded ClickFix Attack With Cache Smuggling to Secretly Download Malicious Files

Posted on October 9, 2025October 9, 2025 By CWS

Cybersecurity researchers have uncovered a classy evolution of the ClickFix assault methodology, the place risk actors are leveraging cache smuggling strategies to keep away from conventional file obtain detection mechanisms.

This progressive marketing campaign targets enterprise networks by masquerading as a Fortinet VPN compliance checking software, particularly exploiting the belief organizations place of their distant entry infrastructure.

The malicious webpage, hosted on the area fc-checker[.]dlccdn[.]com, introduced itself as a professional company safety utility designed to confirm VPN compliance throughout enterprise environments.

The assault represents a major departure from standard ClickFix variants that usually depend on direct file downloads or specific web communication.

As a substitute, attackers have developed a way that pre-emptively shops malicious payloads inside the browser’s cache system, successfully bypassing many safety controls that monitor file downloads and community communications.

The webpage makes use of Fortinet’s branding to lure customers into working malicious code (Supply – Expel)

Expel analysts famous that this system demonstrates a regarding development in social engineering ways, significantly because it targets Fortinet VPN shoppers predominantly utilized by enterprises for safe distant entry.

What makes this marketing campaign significantly harmful is its skill to seem as if customers are executing information already current on their company community.

The webpage shows a textual content field containing what seems to be a regular community file path: “PublicSupportVPNForticlientCompliance.exe”.

Nevertheless, beneath this veneer of legitimacy lies a fancy PowerShell payload designed to extract and execute malicious code from the browser’s cache with out establishing any exterior community connections.

The Hidden Payload Supply Mechanism

The technical sophistication of this assault facilities round its cache smuggling implementation, which represents a novel strategy to payload supply.

When customers work together with the malicious webpage, an obfuscated JavaScript operate executes a fetch request to “/5b900a00-71e9-45cf-acc0-d872e1d6cdaa”, which presents itself as a professional JPEG picture by setting the HTTP Content material-Kind header to “picture/jpeg”.

The browser mechanically caches this supposed picture file, however examination reveals it accommodates no JPEG header and as an alternative homes a compressed ZIP archive wrapped between distinctive delimiter strings “bTgQcBpv” and “mX6o0lBw”.

The PowerShell script hidden inside the clipboard payload features a subtle regex sample that searches Chrome’s cache listing for these particular delimiters: $m=[regex]::Matches($c,'(?.

As soon as positioned, the script extracts the info between these markers, writes it to “ComplianceChecker.zip”, extracts the archive, and executes “FortiClientComplianceChecker.exe” fully offline.

This system successfully circumvents safety options that monitor file downloads or PowerShell internet requests, as no specific community exercise happens in the course of the malicious execution part.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Cache, ClickFix, Download, Files, Hackers, Malicious, Secretly, Smuggling, Upgraded

Post navigation

Previous Post: New Polymorphic Python Malware Repeatedly Mutate its Appearance at Every Execution Time
Next Post: Threat Actors Mimic as HR Departments to Steal Your Gmail Login Credentials

Related Posts

Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon Cyber Security News
Chrome High-Severity Vulnerabilities Allows Memory Manipulation and Arbitrary Code Execution Cyber Security News
New TokenBreak Attack Bypasses AI Model’s with Just a Single Character Change Cyber Security News
New FlipSwitch Hooking Technique Bypasses Linux Kernel Defenses Cyber Security News
CISA Warns of CitrixBleed 2 Vulnerability Exploited in Attacks Cyber Security News
RevengeHotels Leveraging AI To Attack Windows Users With VenomRAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apple Bug Bounty Update: Top Payout $2 Million, $35 Million Paid to Date
  • Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks
  • Google Warns of CL0P Ransomware Group Actively Exploiting Oracle E-Business Suite Zero-Day
  • CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw
  • Authorities Seize BreachForums New Clearnet Cybercrime Marketplace Domain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apple Bug Bounty Update: Top Payout $2 Million, $35 Million Paid to Date
  • Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks
  • Google Warns of CL0P Ransomware Group Actively Exploiting Oracle E-Business Suite Zero-Day
  • CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw
  • Authorities Seize BreachForums New Clearnet Cybercrime Marketplace Domain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News