Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Clickfix Attack Promises “Free WiFi” But Delivers Powershell Based Malware

Posted on September 12, 2025September 12, 2025 By CWS

The Cybersecuritynews researcher group uncovered a classy social engineering marketing campaign that’s exploiting the general public’s want without cost web entry, utilizing misleading Wi-Fi portals to trick customers into downloading and executing PowerShell-based malware.

Dubbed the “Clickfix” assault, this technique turns a consumer’s personal browser actions towards them to compromise their system underneath the guise of a easy human verification step.

The assault targets on people in public areas like airports, the place the promise of “Free Wi-Fi” is a robust lure. Unsuspecting customers making an attempt to attach are redirected to a professionally designed however pretend captive portal.

Free Wifi Promise (Supply: Cybersecuritynews researcher group)

These pages, typically hosted on insecure IP addresses quite than reputable domains, mimic actual community login screens, full with logos and a CAPTCHA immediate to “show you aren’t a robotic,” a characteristic supposed to construct a false sense of safety.

Misleading Verification Course of

The core of the Clickfix assault lies in its intelligent manipulation of consumer conduct. After a consumer interacts with the pretend CAPTCHA, a pop-up window seems with a set of “Verification Steps.”

As a substitute of a easy click on, the directions information the consumer by way of a particular sequence of keyboard shortcuts: press Ctrl+S to save lots of the net web page, navigate to the browser’s downloads window, and press Enter to open the file, the Cybersecuritynews researcher group stated.

Clickfix popup (Supply: Cybersecuritynews researcher group)

This sequence is a social engineering trick designed to bypass customary browser safety warnings about downloading executable recordsdata.

By instructing the consumer to save lots of the web page and run the file themselves, the attackers successfully get consent to execute malicious code. The downloaded file isn’t a picture or doc however a script that initiates the an infection.

As soon as the consumer unwittingly executes the downloaded file, a malicious PowerShell script is launched.

Evaluation of the assault chain with ANY.RUN Sandbox reveals that this script acts as a downloader, establishing a connection to a command-and-control server to fetch the first malware payload. On this marketing campaign, the payload has been recognized as a community trojan.

File execution (Supply: Cybersecuritynews researcher group)

PowerShell is a robust instrument for attackers as a result of it’s built-in into Home windows and might execute instructions, scripts, and payloads straight in reminiscence, typically evading detection by conventional antivirus options.

The sort of fileless malware can be utilized for a variety of malicious actions, together with stealing delicate data, deploying ransomware, or offering a persistent backdoor for distant entry to the compromised system.

To safeguard towards this risk, customers ought to keep alert when connecting to public Wi-Fi, rigorously look at the URLs of login pages, and be very cautious of any web site that requires uncommon keyboard instructions for verification.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Attack, Based, ClickFix, Delivers, Free, Malware, PowerShell, Promises, WiFi

Post navigation

Previous Post: Microsoft Patch for Old Flaw Reveals New Kernel Address Leak Vulnerability in Windows 11/Server 2022 24H2
Next Post: New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit

Related Posts

Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code Cyber Security News
LG Innotek Camera Vulnerabilities Let Attackers Gain Administrative Access Cyber Security News
Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents Cyber Security News
New Report Uncover That Chinese Hackers Attempted To Compromise SentinelOne’s Own Servers Cyber Security News
New RatOn Takes Control Over Bank Account and Initiates Automated Money Transfers Cyber Security News
Windows Server 2025 Golden dMSA Attack Enables Authentication Bypass and Password Generation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers
  • iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot
  • nsKnox Launches Adaptive Payment Security™, Solving the “Impossible Triangle” of B2B Fraud Prevention
  • Ubiquiti UniFi Door Access App Vulnerability Exposes API Management Without Authentication
  • X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers
  • iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot
  • nsKnox Launches Adaptive Payment Security™, Solving the “Impossible Triangle” of B2B Fraud Prevention
  • Ubiquiti UniFi Door Access App Vulnerability Exposes API Management Without Authentication
  • X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News