A new tactic, “ClickFix,” has emerged. It exploits fake Google Meet and Zoom pages to deliver sophisticated malware.
The Sekoia Threat Detection & Research (TDR) team monitors this social engineering strategy closely. It represents a significant evolution in how threat actors deceive users into compromising their systems.
The ClickFix strategy involves displaying deceptive error messages on web browsers, prompting users to execute malicious commands.
These commands, often delivered via PowerShell scripts, ultimately infect users’ systems with malware.
Build an in-house SOC or outsource SOC-as-a-Service -> Calculate Costs
The tactic is particularly concerning because it mimics legitimate video conferencing platforms, such as Google Meet and Zoom, widely used for business and personal communication.
The infection process initiated by ClickFix is alarmingly straightforward. Users visiting the fake video conferencing pages are instructed to follow a series of seemingly innocuous steps:
This method tricks users into running commands that download and execute malware, such as the Amos Stealer for macOS or other payloads for Windows systems.
The technique leverages the appearance of legitimacy by having the malicious command run under Explorer.exe, reducing the chance of detection by security software.
There are several scenarios under which ClickFix can operate:
Each scenario exploits the user’s trust in familiar interfaces like Google Meet to initiate the malware delivery process.
Detecting ClickFix requires vigilance and understanding of typical behavioral patterns associated with these attacks. Key indicators include:
Organizations are advised to employ Endpoint Detection and Response (EDR) systems capable of identifying these patterns. Additionally, network logs from firewalls and proxies can provide valuable insights into potential compromises.
A significant aspect of ClickFix’s success lies in its use of legitimate Windows tools, a strategy known as “living off the land.”
By exploiting tools like bitsadmin.exe, attackers can bypass traditional security measures. This method emphasizes the need for organizations to maintain robust monitoring systems that can discern legitimate use from malicious activity.
The emergence of ClickFix highlights the evolving nature of cyber threats and the sophistication of social engineering tactics.
As threat actors continue to exploit trusted platforms like Google Meet and Zoom, users and organizations must remain vigilant.
Understanding the mechanics of these attacks and implementing comprehensive detection strategies can mitigate the risks posed by ClickFix and similar threats.
Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!
Best DNS Management Tools play a crucial role in efficiently managing domain names and their…
Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS environments…
Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them…
SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from…
In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting abuse…
The Metasploit Framework, a widely used open-source penetration testing tool maintained by Rapid7, has introduced…