Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Upgraded ClickFix Attack With Cache Smuggling to Secretly Download Malicious Files

Posted on October 9, 2025October 9, 2025 By CWS

Cybersecurity researchers have uncovered a classy evolution of the ClickFix assault methodology, the place risk actors are leveraging cache smuggling strategies to keep away from conventional file obtain detection mechanisms.

This progressive marketing campaign targets enterprise networks by masquerading as a Fortinet VPN compliance checking software, particularly exploiting the belief organizations place of their distant entry infrastructure.

The malicious webpage, hosted on the area fc-checker[.]dlccdn[.]com, introduced itself as a professional company safety utility designed to confirm VPN compliance throughout enterprise environments.

The assault represents a major departure from standard ClickFix variants that usually depend on direct file downloads or specific web communication.

As a substitute, attackers have developed a way that pre-emptively shops malicious payloads inside the browser’s cache system, successfully bypassing many safety controls that monitor file downloads and community communications.

The webpage makes use of Fortinet’s branding to lure customers into working malicious code (Supply – Expel)

Expel analysts famous that this system demonstrates a regarding development in social engineering ways, significantly because it targets Fortinet VPN shoppers predominantly utilized by enterprises for safe distant entry.

What makes this marketing campaign significantly harmful is its skill to seem as if customers are executing information already current on their company community.

The webpage shows a textual content field containing what seems to be a regular community file path: “PublicSupportVPNForticlientCompliance.exe”.

Nevertheless, beneath this veneer of legitimacy lies a fancy PowerShell payload designed to extract and execute malicious code from the browser’s cache with out establishing any exterior community connections.

The Hidden Payload Supply Mechanism

The technical sophistication of this assault facilities round its cache smuggling implementation, which represents a novel strategy to payload supply.

When customers work together with the malicious webpage, an obfuscated JavaScript operate executes a fetch request to “/5b900a00-71e9-45cf-acc0-d872e1d6cdaa”, which presents itself as a professional JPEG picture by setting the HTTP Content material-Kind header to “picture/jpeg”.

The browser mechanically caches this supposed picture file, however examination reveals it accommodates no JPEG header and as an alternative homes a compressed ZIP archive wrapped between distinctive delimiter strings “bTgQcBpv” and “mX6o0lBw”.

The PowerShell script hidden inside the clipboard payload features a subtle regex sample that searches Chrome’s cache listing for these particular delimiters: $m=[regex]::Matches($c,'(?.

As soon as positioned, the script extracts the info between these markers, writes it to “ComplianceChecker.zip”, extracts the archive, and executes “FortiClientComplianceChecker.exe” fully offline.

This system successfully circumvents safety options that monitor file downloads or PowerShell internet requests, as no specific community exercise happens in the course of the malicious execution part.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Cache, ClickFix, Download, Files, Hackers, Malicious, Secretly, Smuggling, Upgraded

Post navigation

Previous Post: New Polymorphic Python Malware Repeatedly Mutate its Appearance at Every Execution Time
Next Post: Threat Actors Mimic as HR Departments to Steal Your Gmail Login Credentials

Related Posts

CISA Releases New Indicators of Compromise Tied to BRICKSTORM Malware Cyber Security News
XLoader Malware Analyzed Using ChatGPT’s, Breaks RC4 Encryption Layers in Hours Cyber Security News
EmEditor Editor Website Hacked to Deliver Infostealer Malware in Supply Chain Attack Cyber Security News
17-year-old Hacker Responsible for Vegas Casinos Hack has Been Released Cyber Security News
How to Enrich Alerts with Live Attack Data from 15K SOCs  Cyber Security News
Android Security Update – Patch for Vulnerabilities that Allows Privilege Escalation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark