Beware of ClickFix: A Growing Social Engineering Threat

by  and  | Apr 21, 2025

Executive Summary

ClickFix is a rapidly evolving social engineering technique that began gaining momentum in mid-2024. We have observed the exploitation of this social engineering tactic within multiple client environments as well as multiple threat intelligence sources. By camouflaging malware delivery within fake CAPTCHA verification screens or error messages, threat actors successfully lure end users into pressing Windows+R, pasting malicious code, and executing it, often without raising immediate suspicion. This method of tricking people into self-instigating the infection pathway sidesteps many traditional security controls. This advisory examines how ClickFix operates, documents active campaigns, and provides detection strategies and mitigation recommendations.

 

What is ClickFix?

ClickFix is a social engineering tactic that tricks users into executing malicious code through a series of deceptive prompts. The attack typically begins with the following sequence:

1. Initial Engagement

Users are presented with a fake CAPTCHA verification screen or error message when visiting compromised websites, clicking on malicious ads, or opening phishing attachments.

Fake CAPTCHA – Medium.com (Rizqi Setyo Kusprihantanto)

2. Social Engineering:

The fake verification page instructs the user to perform a specific sequence of actions:

  • Press Windows+R to open the Run dialog
  • Press Ctrl+V to paste content from clipboard (which contains malicious code secretly copied by the webpage)
  • Press Enter to execute the command

Fake Verification Page – Medium.com (Rizqi Setyo Kusprihantanto)

Fake Verification Page – (Ben Martin)

3. Execution

The pasted command typically leverages Windows utilities like mshta.exe or PowerShell to download and execute additional malicious payloads.

Fake Verification Page – Medium.com (Rizqi Setyo Kusprihantanto)

Active ClickFix Campaigns

Several major malware families have been distributed through ClickFix campaigns. Lumma Stealer, a Malware-as-a-Service infostealer that emerged in 2022, has been widely deployed through these campaigns since December 2024. The Center for Internet Security (CIS) identified a campaign specifically targeting U.S. State, Local, Tribal, and Territorial (SLTT) government organizations with Lumma Stealer. Other prominent malware distributed via ClickFix includes NetSupport RAT (documented by eSentire since January 2025), AsyncRAT, VenomRAT, DanaBot, XWorm, DarkGate, and various ransomware payloads. These malware families collectively provide attackers with capabilities ranging from credential theft and cryptocurrency wallet compromise to remote system control and data exfiltration.

In the past few months alone, various sources have reported widespread ClickFix abuse. Trustwave SpiderLabs observed multi-stage PowerShell execution processes with XOR encryption and AMSI bypasses to deliver multiple infostealer variants. FortiGuard Labs documented a phishing campaign using ClickFix to deploy a modified Havoc C2 Framework that leverages Microsoft Graph API to obscure communications. Sucuri research identified a massive WordPress-based campaign affecting over 5,200 websites, which used the Binance Smart Chain network to load malicious JavaScript that creates fake CAPTCHA screens. Researchers observed prominent threat group, Lazarus leveraging the ClickFix tactic to distribute FrostyFerret , GolangGhost, and other malware. Notably in Lazarus’s campaign curl was leveraged in place of mshta to deliver payloads. Microsoft Security researchers documented a campaign impersonating Booking.com that targeted the hospitality sector with multiple credential-stealing malware variants. According to Microsoft Threat Intelligence, these campaigns target individuals across multiple sectors, including hospitality, healthcare, banking, telecom, and marketing organizations in North America, Europe, Oceania, and parts of Asia.

Recommendations

Mitigations

Group Policy Object (GPO) Controls:

Tools/EDR:

  • Zero Trust Network Access (ZTNA) solution software such as Appgate SDP can be used if restricting the Windows Run dialog is not preferable. Such software can be configured and used as a “speedbump”, warning users of potential malicious Windows Run executions.

User Education:

  • CAPTCHA Awareness: Educate users specifically about ClickFix tactics, emphasizing that legitimate CAPTCHA verifications never require executing Windows commands and that they should report suspicious verification prompts requesting Windows+R key combinations to security teams.
  • Reporting Procedures: Establish clear procedures that encourage users to report suspicious websites or unusual CAPTCHA experiences.

Detection Opportunities

  • Monitor for and consider blocking JavaScript or VBScript from launching downloaded executable content.
  • Develop detection rules for process chains involving mshta.exe or PowerShell executing with encoded parameters, especially when following browser activity.
  • Monitor for suspicious RunMRU registry entries containing PowerShell commands, particularly those with base64 encoding or invoking web requests.
  • Consider implementing detections for AMSI bypass techniques, especially code patterns containing strings like “AMSI_RESULT_NOT_DETECTED,” which sources note is used by Lumma Stealer and other ClickFix-distributed malware.

 

Safeguards for SCALR XDR Customers

SRA’s Detection Engineering team is regularly adding new detections. This is intended to highlight potential safeguards observed in the common attack chain and may not be exhaustive of full protection.

SCALR XDR customers are protected by the following detection rules:

Alert

Prerequisites

Description

Potentially Suspicious Command Executed Via Run Dialog Box

Necessary Logs: Registry Events

Compatible EDR(s):
Microsoft Defender

MITRE Technique: T1202: Indirect Command Execution

This alert looks for new MRU Registry entries where the values are related to CMD, PowerShell, or MSHTA commands being run. An adversary could execute malicious commands using the Run Dialog Box. The Windows Run Dialog box allows users to open programs, websites, and access Windows settings. The user will copy and paste a command into the Run Dialog box and execute it. This gives the attacker the initial foothold on the endpoint.

MSHTA Execution via Remote Payload

Necessary Logs: Process Creation Events

Compatible EDR(s):

Microsoft Defender

CrowdStrike

SentinelOne

MITRE Technique: T1218.005: Mshta

This alert will fire when mshta executes a remote file using either http or ftp. Threat actors can use mshta.exe, which is a trusted Windows utility, to covertly download and/or execute malicious files to bypass application control solutions. 

Registry Run Key Added

 

Necessary Logs: Process Creation Events

Compatible EDR(s):

Microsoft Defender

CrowdStrike

SentinelOne

MITRE Technique: T1547.001: Registry Run Keys / Startup Folder

This alert detects a new Registry run key being added. Adversaries may add a run key in order to establish persistence on a system.

MSHTA Execution via Inline Script

 

Necessary Logs: Process Creation Events

Compatible EDR(s):

Microsoft Defender

CrowdStrike

SentinelOne

MITRE Technique: T1218.005: System Binary Proxy Execution: Mshta

This detection triggers when MSHTA.exe is used to execute JavaScript or VBscript. Adversaries may abuse mshta.exe to proxy execution of malicious .hta files and Javascript or VBScript through a trusted Windows utility.

Payload Downloaded via Curl.exe

Necessary Logs: Process Creation Events

Compatible EDR(s):

Microsoft Defender

CrowdStrike

SentinelOne

MITRE Technique: T1105: Ingress Tool Transfer

Curl is a command-line tool to transfer data to or from a server, using any of the supported protocols: TTP, FTP, IMAP, POP3, SCP, SFTP, SMTP, TFTP, TELNET, LDAP, or FILE. Curl.exe has increasingly been used by adversaries as part of their attacks to download malicious payloads onto infected systems. This is typically achieved by using the -o switch, which saves the downloaded file on the local machine with the name provided in the parameters, and by defining a URL, which is where the malicious artifact resides.

MSHTA Executing Code from Registry

Necessary Logs: Process Creation Events

Compatible EDR(s):

Microsoft Defender

CrowdStrike

SentinelOne

T1218.005: Mshta

This alert detects Mshta executing code from the registry. Adversaries may store code in the Registry as part of initial access that can then be executed via mshta commands.

Suspicious Encoded PowerShell Commands

Necessary Logs: Process Creation Events

Compatible EDR(s):

Microsoft Defender

SentinelOne

 

T1027: Obfuscated Files or Information

This rule is designed to detect the execution of encoded PowerShell commands, which are often used by attackers to obfuscate malicious activities. Encoding PowerShell commands is a common technique to bypass security controls and evade detection. This rule aims to identify and flag such activities to prevent potential security breaches.

Potentially Suspicious Command Executed Via Run Dialog Box

Prerequisites

Necessary Logs: Registry Events

Compatible EDR(s):
Microsoft Defender

Description

MITRE Technique: T1202: Indirect Command Execution

This alert looks for new MRU Registry entries where the values are related to CMD, PowerShell, or MSHTA commands being run. An adversary could execute malicious commands using the Run Dialog Box. The Windows Run Dialog box allows users to open programs, websites, and access Windows settings. The user will copy and paste a command into the Run Dialog box and execute it. This gives the attacker the initial foothold on the endpoint.

MSHTA Execution via Remote Payload

Prerequisites

Necessary Logs: Process Creation Events

Compatible EDR(s):
Microsoft Defender
CrowdStrike
SentinelOne

Description

MITRE Technique: T1218.005: Mshta

This alert will fire when mshta executes a remote file using either http or ftp. Threat actors can use mshta.exe, which is a trusted Windows utility, to covertly download and/or execute malicious files to bypass application control solutions.

Registry Run Key Added

Prerequisites

Necessary Logs: Process Creation Events

Compatible EDR(s):
Microsoft Defender
CrowdStrike
SentinelOne

Description

MITRE Technique: T1547.001: Registry Run Keys / Startup Folder

This alert detects a new Registry run key being added. Adversaries may add a run key in order to establish persistence on a system.

MSHTA Execution via Inline Script

Prerequisites

Necessary Logs: Process Creation Events

Compatible EDR(s):
Microsoft Defender
CrowdStrike
SentinelOne

Description

MITRE Technique: T1218.005: System Binary Proxy Execution: Mshta

This detection triggers when MSHTA.exe is used to execute JavaScript or VBscript. Adversaries may abuse mshta.exe to proxy execution of malicious .hta files and Javascript or VBScript through a trusted Windows utility.

Payload Downloaded via Curl.exe

Prerequisites

Necessary Logs: Process Creation Events

Compatible EDR(s):
Microsoft Defender
CrowdStrike
SentinelOne

Description

MITRE Technique: T1105: Ingress Tool Transfer

Curl is a command-line tool to transfer data to or from a server, using any of the supported protocols: TTP, FTP, IMAP, POP3, SCP, SFTP, SMTP, TFTP, TELNET, LDAP, or FILE. Curl.exe has increasingly been used by adversaries as part of their attacks to download malicious payloads onto infected systems. This is typically achieved by using the -o switch, which saves the downloaded file on the local machine with the name provided in the parameters, and by defining a URL, which is where the malicious artifact resides.

MSHTA Executing Code from Registry

Prerequisites

Necessary Logs: Process Creation Events

Compatible EDR(s):
Microsoft Defender
CrowdStrike
SentinelOne

Description

MITRE Technique: T1218.005: Mshta

This alert detects Mshta executing code from the registry. Adversaries may store code in the Registry as part of initial access that can then be executed via mshta commands.

MSHTA Execution via Inline Script

Prerequisites

Necessary Logs: Process Creation Events

Compatible EDR(s):
Microsoft Defender
CrowdStrike
SentinelOne

Description

MITRE Technique: T1218.005: System Binary Proxy Execution: Mshta

This detection triggers when MSHTA.exe is used to execute JavaScript or VBscript. Adversaries may abuse mshta.exe to proxy execution of malicious .hta files and Javascript or VBScript through a trusted Windows utility.

Richard Andrews
Consultant |  Archive

Cyber Security Professional & DEI Leader, with years of experience in the field of information security in both a corporate consulting space and the federal government. Richard is particularly passionate about Cyber Threat Intelligence and transforming threat intelligence into actionable insights, specializing in security operations, incident response, and threat detection. Richard attended Penn State University, where he majored in Security and Risk Analysis and is a proud Air Force veteran.

Vanessa Joseph
Senior Consultant |  Archive

Vanessa is a experienced cybersecurity professional who's passionate about cyber threat intelligence, threat hunting, and incident response. Her work focuses on proactive threat hunting and intelligence analysis to identify threats and strengthen detection and incident response capabilities.

She earned her B.A. in Administration of Justice and M.S. in Homeland Security with concentrations in Digital Forensics and Cybersecurity from Salve Regina University.