Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands

Posted on June 24, 2025June 24, 2025 By CWS

A novel social engineering approach referred to as “FileFix” that exploits Home windows File Explorer’s handle bar performance to execute malicious instructions, presenting a harmful various to the more and more in style ClickFix assault methodology.

The approach, found by safety researcher mr.d0x, leverages browser file add performance to open Home windows File Explorer and methods customers into executing PowerShell instructions by means of the handle bar slightly than the standard Home windows Run Dialog.

Command Execution Supply: mr.d0x

This methodology circumvents many safety consciousness coaching applications that concentrate on recognizing Run Dialog-based assaults.

ClickFix assaults have emerged as a big menace since early 2024, with cybersecurity corporations reporting a surge in these social engineering campaigns.

The approach usually entails faux error messages or CAPTCHA prompts that instruct customers to repeat and paste malicious instructions into the Home windows Run Dialog (Home windows Key + R).

In line with current menace intelligence stories, ClickFix campaigns have been noticed distributing numerous malware households, together with AsyncRAT, DarkGate, Lumma Stealer, and NetSupport RAT.

The assaults have been adopted by a number of menace actors, from particular person cybercriminals to nation-state teams similar to Russia-linked APT28 and Iran-linked MuddyWater.

How FileFix Exploits File Explorer

The FileFix assault methodology begins with a convincing phishing webpage that mimics authentic file-sharing companies. When customers click on an “Open File Explorer” button, JavaScript robotically copies a malicious PowerShell command to the clipboard whereas concurrently triggering the browser’s file add dialog.

Assault Stream – Picture Credit (Cybersecuritynews.com)

The file add performance causes Home windows File Explorer to open, at which level the assault depends on social engineering to information customers by means of the execution course of.

The malicious webpage gives directions for customers to stick what they imagine is a file path into the File Explorer handle bar utilizing Ctrl+L, however the clipboard really incorporates a hidden PowerShell command, mr.d0x stated.

A key facet of the assault entails command obfuscation, the place the malicious PowerShell script is concatenated with a faux file path after a remark image, making it seem authentic to unsuspecting customers. For instance: Powershell.exe -c ping instance.com # C:firminternal-securefiledriveHRPolicy.docx

The assault exploits Home windows File Explorer’s skill to execute instructions instantly from the handle bar, a characteristic that many customers are unaware of.

Safety researchers have documented how File Explorer can run numerous system instructions, together with PowerShell, Command Immediate, and different utilities, when entered into the handle bar.

The researchers have additionally recognized a secondary variation that entails downloading executable information and leveraging the truth that applications executed by means of File Explorer’s handle bar have their Mark of the Internet (MOTW) attribute eliminated. This might probably bypass sure safety controls that depend on MOTW for menace detection.

The FileFix approach represents an evolution in social engineering assaults, shifting past the standard ClickFix methodology whereas sustaining related effectiveness. The assault is especially regarding as a result of it operates solely throughout the browser atmosphere and depends on authentic Home windows performance.

Cybersecurity consultants suggest monitoring for suspicious little one processes spawned by browsers, significantly cmd.exe and PowerShell.exe, in addition to different system utilities. Organizations must also replace their safety consciousness coaching to incorporate File Explorer-based assault vectors alongside conventional Run Dialog methods.

As phishing assaults proceed to evolve with a reported 202% improve in total phishing messages in 2024, the emergence of FileFix demonstrates how menace actors repeatedly adapt their methods to bypass safety measures and consumer consciousness applications.

The simplicity and effectiveness of those browser-based assaults underscore the continuing problem of defending in opposition to human-targeted social engineering campaigns.

Stay Credential Theft Assault Unmask & On the spot Protection – Free Webinar

Cyber Security News Tags:Abuses, Attack, Commands, Execute, Explorer, File, FileFix, Malicious, Windows

Post navigation

Previous Post: Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange
Next Post: New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public

Related Posts

2,000+ Devices Hacked Using Weaponized Social Security Statement Themes Cyber Security News
New Weaponized PyPI Package Attacking Developers to Steal Source Code Cyber Security News
BlueNoroff Hackers Weaponize Zoom App to Attack System Using Infostealer Malware Cyber Security News
Prioritizing Vulnerabilities in a Sea of Alerts Cyber Security News
PLA Rapidly Deploys AI Technology Across Military Intelligence Operations Cyber Security News
Identity and Access Management Trends Shaping 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Disable Unused Network Ports
  • New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
  • New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands
  • Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange
  • 2,000+ Devices Hacked Using Weaponized Social Security Statement Themes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • How to Disable Unused Network Ports
  • New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
  • New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands
  • Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange
  • 2,000+ Devices Hacked Using Weaponized Social Security Statement Themes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News