Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks

Posted on June 26, 2025June 26, 2025 By CWS

Jun 26, 2025Ravie LakshmananCyber Assault / Malware Evaluation
The ClickFix social engineering tactic as an preliminary entry vector utilizing faux CAPTCHA verifications elevated by 517% between the second half of 2024 and the primary half of this 12 months, based on information from ESET.
“The record of threats that ClickFix assaults result in is rising by the day, together with infostealers, ransomware, distant entry trojans, cryptominers, post-exploitation instruments, and even customized malware from nation-state-aligned risk actors,” Jiří Kropáč, Director of Risk Prevention Labs at ESET, stated.
ClickFix has grow to be a broadly fashionable and misleading technique that employs bogus error messages or CAPTCHA verification checks to deceive victims into copying and pasting a malicious script into both the Home windows Run dialog or the Apple macOS Terminal app, and working it.
The Slovak cybersecurity firm stated the very best quantity of ClickFix detections is concentrated round Japan, Peru, Poland, Spain, and Slovakia.

The prevalence and effectiveness of this assault technique have led to risk actors promoting builders that present different attackers with ClickFix-weaponized touchdown pages, ESET added.

From ClickFix to FileFix
The event comes as safety researcher mrd0x demonstrated a proof-of-concept (PoC) various to ClickFix named FileFix that works by tricking customers into copying and pasting a file path into Home windows File Explorer.
The method primarily entails attaining the identical as ClickFix however in a distinct method by combining File Explorer’s means to execute working system instructions by means of the tackle bar with an internet browser’s file add characteristic.

Within the assault state of affairs devised by the researcher, a risk actor could devise a phishing web page that, as a substitute of displaying a faux CAPTCHA test to the potential goal, presents a message stating a doc has been shared with them and that they should copy and paste the file path on the tackle bar by urgent CTRL + L.
The phishing web page additionally features a distinguished “Open File Explorer” that, upon clicking, opens the File Explorer and copies a malicious PowerShell command to the person’s clipboard. Thus, when the sufferer pastes the “file path,” the attacker’s command is executed as a substitute.

This, in flip, is achieved by altering the copied file path to prepend the PowerShell command earlier than it adopted by including areas to cover it from view and a pound signal (“#”) to deal with the faux file path as a remark: “Powershell.exe -c ping instance.com<house># C:<path_to_file>decoy.doc”
“Moreover, our PowerShell command will concatenate the dummy file path after a remark with a view to conceal the command and present the file path as a substitute,” mrd0x stated.
Phishing Campaigns Galore

The surge in ClickFix campaigns additionally coincides with the invention of assorted phishing campaigns that –

Leverage a .gov area to ship phishing emails that masquerade as unpaid toll to take customers to bogus pages which might be designed to gather their private and monetary data
Make use of long-lived domains (LLDs), a method referred to as strategic area getting older, to both host or use them to redirect customers to customized CAPTCHA test pages, finishing which they’re led to spoofed Microsoft Groups pages to steal their Microsoft account credentials
Distribute malicious Home windows shortcut (LNK) recordsdata inside ZIP archives to launch PowerShell code answerable for deploying Remcos RAT
Make use of lures which supposedly warn customers that their mailbox is nearly full and that they should “clear storage” by clicking a button embedded within the message, performing which takes the person to a phishing web page hosted on IPFS that steals customers e mail credentials. Apparently, the emails additionally embody a RAR archive attachment that, as soon as extracted and executed, drops the XWorm malware.
Incorporate a URL that lets to a PDF doc, which, in flip, incorporates one other URL that drops a ZIP archive, which incorporates an executable answerable for launching an AutoIT-based Lumma Stealer
Weaponize a respectable front-end platform referred to as Vercel to host bogus websites that propagate a malicious model of LogMeIn to achieve full management over victims’ machines
Impersonate U.S. state Departments of Motor Autos (DMVs) to ship SMS messages about unpaid toll violations and redirect recipients to misleading websites that harvest private data and bank card particulars
Make the most of SharePoint-themed emails to redirect customers to credential harvesting pages hosted on “*.sharepoint[.]com” domains that siphon customers’ Microsoft account passwords.

“Emails containing SharePoint hyperlinks are much less prone to be flagged as malicious or phishing by EDR or antivirus software program. Customers additionally are usually much less suspicious, believing Microsoft hyperlinks are inherently safer,” CyberProof stated.
“Since phishing pages are hosted on SharePoint, they’re usually dynamic and accessible solely by means of a particular hyperlink for a restricted time, making them more durable for automated crawlers, scanners, and sandboxes to detect.”

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Attacks, ClickFix, Emerges, FileFix, Method, Rise, Threat

Post navigation

Previous Post: Man Who Hacked Organizations to Advertise Security Services Pleads Guilty
Next Post: Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access

Related Posts

Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program The Hacker News
nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery The Hacker News
Identity Security Has an Automation Problem—And It’s Bigger Than You Think The Hacker News
Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App The Hacker News
Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud The Hacker News
Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks
  • Bipartisan Bill Aims to Block Chinese AI From Federal Agencies
  • Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access
  • New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks
  • Man Who Hacked Organizations to Advertise Security Services Pleads Guilty

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks
  • Bipartisan Bill Aims to Block Chinese AI From Federal Agencies
  • Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access
  • New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks
  • Man Who Hacked Organizations to Advertise Security Services Pleads Guilty

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News