In early 2025, cybersecurity experts sounded the alarm as the North Korean-linked Kimsuky group escalated its use of a deceptive technique known as “ClickFix.”
This tactic, first detailed by Proofpoint in April 2024 and further analyzed by Genians Security Center (GSC), leverages social engineering to trick users into executing malicious PowerShell scripts on their systems.
Unlike traditional malware delivery, ClickFix relies on psychological manipulation, disguising itself as troubleshooting guides or security verification procedures, to bypass security controls and exploit human trust.
The ClickFix campaign is considered an extension of Kimsuky’s notorious “BabyShark” threat activity, known for rapid adaptation and the integration of new attack vectors.
According to recent reports, state-sponsored actors from North Korea, Iran, and Russia have adopted ClickFix, underscoring its effectiveness and global reach.
The attack typically begins with a highly targeted spear-phishing email. For example, in January 2025, a South Korean diplomat received an email from an individual posing as a journalist.
After establishing trust through several exchanges, the attacker sent a malicious file disguised as an interview questionnaire.
The file contained a Visual Basic Script (VBS) that, when executed, would open a decoy document, create a hidden directory, download additional malware from a command-and-control (C2) server (e.g., konamo[.]xyz), and establish persistence via scheduled tasks.
The VBS script employed string obfuscation, inserting random numbers such as “7539518426” to evade detection. At runtime, these numbers were stripped out, restoring the original malicious command.
Recognizing that security solutions increasingly detected VBS-based attacks, Kimsuky pivoted to the ClickFix tactic.
In this variant, targets receive a PDF “manual” and a text file (Code.txt) containing an “authentication code.”
The manual instructs the user to copy and paste this code into a PowerShell window, often under the guise of accessing a secure document or fixing a browser error.
The PowerShell command is obfuscated using reverse-order encoding. For instance:
powershell$req_value=-join $value.ToCharArray()[-1..-$value.Length]; cmd /c $req_value; exit;
The $value variable holds the core command in reverse, which is then reconstructed and executed. This approach makes the payload difficult to spot at a glance.
Kimsuky also deploys ClickFix via compromised or fake websites, such as job portals. Victims are prompted to install remote desktop tools or paste commands into PowerShell, granting attackers remote access.
Analysis has linked these operations to a broad infrastructure, including domains like raedom[.]store, kida, plusdocs, kro[.]kr, and securedrive.fin-tech[.]com.
The group utilizes multiple C2 servers, frequently rotating addresses and employing obfuscation to evade detection.
ClickFix’s reliance on user action makes it difficult for traditional antivirus solutions to detect. Experts recommend:
Indicators of Compromise (IoCs):
As Kimsuky and other state-sponsored actors refine their social engineering techniques, organizations must remain vigilant and invest in layered defenses to counter these evolving threats.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…