Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Upgraded ClickFix Attack With Cache Smuggling to Secretly Download Malicious Files

Posted on October 9, 2025October 9, 2025 By CWS

Cybersecurity researchers have uncovered a classy evolution of the ClickFix assault methodology, the place risk actors are leveraging cache smuggling strategies to keep away from conventional file obtain detection mechanisms.

This progressive marketing campaign targets enterprise networks by masquerading as a Fortinet VPN compliance checking software, particularly exploiting the belief organizations place of their distant entry infrastructure.

The malicious webpage, hosted on the area fc-checker[.]dlccdn[.]com, introduced itself as a professional company safety utility designed to confirm VPN compliance throughout enterprise environments.

The assault represents a major departure from standard ClickFix variants that usually depend on direct file downloads or specific web communication.

As a substitute, attackers have developed a way that pre-emptively shops malicious payloads inside the browser’s cache system, successfully bypassing many safety controls that monitor file downloads and community communications.

The webpage makes use of Fortinet’s branding to lure customers into working malicious code (Supply – Expel)

Expel analysts famous that this system demonstrates a regarding development in social engineering ways, significantly because it targets Fortinet VPN shoppers predominantly utilized by enterprises for safe distant entry.

What makes this marketing campaign significantly harmful is its skill to seem as if customers are executing information already current on their company community.

The webpage shows a textual content field containing what seems to be a regular community file path: “PublicSupportVPNForticlientCompliance.exe”.

Nevertheless, beneath this veneer of legitimacy lies a fancy PowerShell payload designed to extract and execute malicious code from the browser’s cache with out establishing any exterior community connections.

The Hidden Payload Supply Mechanism

The technical sophistication of this assault facilities round its cache smuggling implementation, which represents a novel strategy to payload supply.

When customers work together with the malicious webpage, an obfuscated JavaScript operate executes a fetch request to “/5b900a00-71e9-45cf-acc0-d872e1d6cdaa”, which presents itself as a professional JPEG picture by setting the HTTP Content material-Kind header to “picture/jpeg”.

The browser mechanically caches this supposed picture file, however examination reveals it accommodates no JPEG header and as an alternative homes a compressed ZIP archive wrapped between distinctive delimiter strings “bTgQcBpv” and “mX6o0lBw”.

The PowerShell script hidden inside the clipboard payload features a subtle regex sample that searches Chrome’s cache listing for these particular delimiters: $m=[regex]::Matches($c,'(?.

As soon as positioned, the script extracts the info between these markers, writes it to “ComplianceChecker.zip”, extracts the archive, and executes “FortiClientComplianceChecker.exe” fully offline.

This system successfully circumvents safety options that monitor file downloads or PowerShell internet requests, as no specific community exercise happens in the course of the malicious execution part.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Cache, ClickFix, Download, Files, Hackers, Malicious, Secretly, Smuggling, Upgraded

Post navigation

Previous Post: New Polymorphic Python Malware Repeatedly Mutate its Appearance at Every Execution Time
Next Post: Threat Actors Mimic as HR Departments to Steal Your Gmail Login Credentials

Related Posts

New Phishing Kit Automates Generation of ClickFix Attack Bypassing Security Measures Cyber Security News
CodeIgniter Vulnerability Exposes Million of Webapps to File Upload Attacks Cyber Security News
Key Vulnerabilities, Threats, and Data Breaches Cyber Security News
New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks Cyber Security News
Microsoft Defender for Office 365 to Block Email Bombing Attacks Cyber Security News
Web DDoS, App Exploitation Attacks Saw a Huge Surge in First Half of 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Quishing Attack With Weaponized QR Code Targeting Microsoft Users
  • Hackers Actively Exploiting WordPress Plugin Vulnerability to Gain Admin Access
  • Threat Actors Mimic as HR Departments to Steal Your Gmail Login Credentials
  • Hackers Upgraded ClickFix Attack With Cache Smuggling to Secretly Download Malicious Files
  • New Polymorphic Python Malware Repeatedly Mutate its Appearance at Every Execution Time

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Quishing Attack With Weaponized QR Code Targeting Microsoft Users
  • Hackers Actively Exploiting WordPress Plugin Vulnerability to Gain Admin Access
  • Threat Actors Mimic as HR Departments to Steal Your Gmail Login Credentials
  • Hackers Upgraded ClickFix Attack With Cache Smuggling to Secretly Download Malicious Files
  • New Polymorphic Python Malware Repeatedly Mutate its Appearance at Every Execution Time

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News