PULSE NAME
Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape
WHITE AlienVault 2024-11-18 Modified: 2024-12-18
26
IOCs
MEDIUM VOLUME
Proofpoint researchers have identified a surge in the ClickFix social engineering technique across the threat landscape. This technique uses dialogue boxes with fake error messages to trick users into copying, pasting, and running malicious content on their computers. Multiple threat actors are employing ClickFix through compromised websites, documents, HTML attachments, and malicious URLs. Recent campaigns have included GitHub security vulnerability notifications, Swiss e-commerce marketplace impersonations, fake software updates, and ChatGPT-themed malvertising. The technique has been observed delivering various malware, including AsyncRAT, Danabot, DarkGate, Lumma Stealer, and NetSupport. The popularity of ClickFix is attributed to its effectiveness in bypassing security protections by exploiting users' desire to be helpful and independent.
MITRE ATT&CK & Malware Families
ATT&CK TECHNIQUES
MALWARE FAMILIES
AsyncRAT Danabot DarkGate Lumma Stealer NetSupport Brute Ratel C4 Latrodectus XWorm Lucky Volunteer
Indicators of Compromise (4 / 26 total)
All domain FileHash-MD5 FileHash-SHA1 FileHash-SHA256 URL hostname
TYPEINDICATORDESCRIPTIONCREATED
FileHash-SHA256 d737637ee5f121d11a6f3295bf0d51b06218812b5ec04fe9ea484921e905a207 2024-11-18
FileHash-SHA256 5d5b4f259ef3b3d20f6ef1a63def6dee9326efe2b7b7b7e474008aa978f1f19b 2024-11-18
FileHash-SHA256 d9ab6cfa60cc75785e31ca9b5a31dae1c33022bdb90cb382ef3ca823c627590d 2024-11-18
FileHash-SHA256 e726d3324ca8b9a8da4d317c5d749dd0ad58fd447a2eb5eee75ef14824339cd5 2024-11-18