Today > vulnerabilities   -   You can now download lists of IOCs here!

Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape

Nov. 18, 2024, 5:33 p.m.

Description

Proofpoint researchers have identified a surge in the ClickFix social engineering technique across the threat landscape. This technique uses dialogue boxes with fake error messages to trick users into copying, pasting, and running malicious content on their computers. Multiple threat actors are employing ClickFix through compromised websites, documents, HTML attachments, and malicious URLs. Recent campaigns have included GitHub security vulnerability notifications, Swiss e-commerce marketplace impersonations, fake software updates, and ChatGPT-themed malvertising. The technique has been observed delivering various malware, including AsyncRAT, Danabot, DarkGate, Lumma Stealer, and NetSupport. The popularity of ClickFix is attributed to its effectiveness in bypassing security protections by exploiting users' desire to be helpful and independent.

Date

Published: Nov. 18, 2024, 12:47 p.m.

Created: Nov. 18, 2024, 12:47 p.m.

Modified: Nov. 18, 2024, 5:33 p.m.

Attack Patterns

Lucky Volunteer

Latrodectus

Danabot

Lumma Stealer

Brute Ratel C4

DarkGate

XWorm

NetSupport

AsyncRAT

T1059.001

T1547.001

T1204.002

T1105

T1055

T1036

T1204

T1027

T1566

T1078

Additional Informations

Technology

Transportation

Government

Switzerland

Ukraine