By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns
Computing

State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns

News Room
Last updated: 2025/04/17 at 9:20 AM
News Room Published 17 April 2025
Share
SHARE

Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have been found leveraging the increasingly popular ClickFix social engineering tactic to deploy malware over a three-month period from late 2024 through the beginning of 2025.

The phishing campaigns adopting the strategy have been attributed to clusters tracked as TA427 (aka Kimsuky), TA450 (aka MuddyWater, UNK_RemoteRogue, and TA422 (aka APT28).

ClickFix has been an initial access technique primarily affiliated with cybercrime groups, although the effectiveness of the approach has led to it also being adopted by nation-state groups.

“The incorporation of ClickFix is not revolutionizing the campaigns carried out by TA427, TA450, UNK_RemoteRogue, and TA422 but instead is replacing the installation and execution stages in existing infection chains,” enterprise security firm Proofpoint said in a report published today.

ClickFix, in a nutshell, refers to a sneaky technique that urges users to infect their own machine by following a series of instructions to copy, paste, and run malicious commands under the pretext of fixing an issue, completing a CAPTCHA verification, or registering their device.

Cybersecurity

Proofpoint said it first detected Kimsuky using ClickFix in January and February 2025 as part of a phishing campaign that targeted individuals in less than five organizations in the think tank sector.

“TA427 made initial contact with the target through a meeting request from a spoofed sender delivered to traditional TA427 targets working on North Korean affairs,” the Proofpoint research team said.

ClickFix Tactic in Targeted Malware Campaigns

“After a brief conversation to engage the target and build trust, as is often seen in TA427 activity, the attackers directed the target to an attacker-controlled site where they convinced the target to run a PowerShell command.”

The attack chain, the company explained, initiated a multi-stage sequence that culminated in the deployment of an open-source remote access trojan named Quasar RAT.

The email message purported to originate from a Japanese diplomat and asked the recipient to arrange a meeting with the Japanese ambassador to the United States. Over the course of the conversation, the threat actors sent a malicious PDF that contained a link to another document with a list of questions to be discussed during the meeting.

ClickFix Tactic in Targeted Malware Campaigns

Clicking on the link directed the victim to a fake landing page mimicking the Japanese Embassy website, which then prompted them to register their device by copying and pasting a command into the Windows Run dialog in order to download the questionnaire.

“The ClickFix PowerShell command fetches and executes a second remotely hosted PowerShell command, which displayed the decoy PDF referenced earlier in the chain (Questionnaire.pdf) to the user,” Proofpoint said. “The document claimed to be from the Ministry of Foreign Affairs in Japan and contained questions regarding nuclear proliferation and policy in Northeast Asia.”

The second PowerShell script is configured to create a Visual Basic Script that runs every 19 minutes by means of a scheduled task, which, in turn, downloads two batch scripts that create, decode, and execute the Quasar RAT payload. It’s worth pointing out that a variation of this attack chain was previously documented by Microsoft in February 2025.

ClickFix Tactic in Targeted Malware Campaigns

The second nation-state group to latch on to ClickFix is the Iran-linked MuddyWater group that has taken advantage of the technique to legitimate remote monitoring and management (RMM) software like Level for maintaining persistent access.

The phishing emails, sent on November 13 and 14, 2024, coinciding with Microsoft’s Patch Tuesday updates, masqueraded as a security update from the tech giant, asking message recipients to follow ClickFix-style instructions to address a supposed vulnerability.

“The attackers deployed the ClickFix technique by persuading the target to first run PowerShell with administrator privileges, then copy and run a command contained in the email body,” Proofpoint said.

“The command was responsible for installing remote management and monitoring (RMM) software – in this case, Level – after which TA450 operators will abuse the RMM tool to conduct espionage and exfiltrate data from the target’s machine.”

Cybersecurity

The TA450 ClickFix campaign is said to target finance, government, health, education, and transportation sectors across the Middle East, with an emphasis on the United Arab Emirates (U.A.E.) and Saudi Arabia, as well as those located in Canada, Germany, Switzerland, and the United States.

Also observed boarding the ClickFix bandwagon is a suspected Russian group tracked as UNK_RemoteRogue towards the end of last year using lure emails sent from likely compromised Zimbra servers that included a link to a Microsoft Office document.

Visiting the link displayed a page containing instructions to copy code from the browser into their terminal, along with a YouTube video tutorial on how to run PowerShell. The PowerShell command was equipped with capabilities to run JavaScript that executed PowerShell code linked to the Empire command-and-control (C2) framework.

Proofpoint said the campaign sent 10 messages to individuals in two organizations associated with a major arms manufacturer in the defense industry. UNK_RemoteRogue has also been found to share infrastructure overlaps with another phishing campaign that targeted defense and aerospace entities with links to the ongoing conflict in Ukraine to harvest webmail credentials via fake login pages.

“Multiple examples of state-sponsored actors using ClickFix have shown not only the technique’s popularity among state actors, but also its use by various countries within weeks of one another,” the company said. “Although not a persistently used technique, it is likely that more threat actors from North Korea, Iran, and Russia have also tried and tested ClickFix or may in the near future.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The GameSir G7 SE Is a Great Cheap Controller
Next Article LLM and Generative AI for Sensitive Data – Navigating Security, Responsibility, and Pitfalls in Highly Regulated Industries
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

DingTalk launches immersive workplace for Apple Vision Pro · TechNode
Computing
Huge Home Depot weekend sale takes up to 50% off patio furniture, grills and more — 27 deals I’d shop now
News
Microsoft 365’s Family plan is nearly 50% off on Amazon
Gadget
Student Loan Borrowers, You Have Until Summer to Prevent Your Wages From Being Garnished
News

You Might also Like

Computing

DingTalk launches immersive workplace for Apple Vision Pro · TechNode

1 Min Read
Computing

What the Investments and Securities Act means for Nigeria’s crypto

15 Min Read
Computing

10 Best Google Sheets Alternatives & Competitors in 2025

23 Min Read
Computing

Spectral Estimation Algorithms: Prony’s, ESPRIT, MUSIC & More | HackerNoon

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?