PULSE NAME
Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape
WHITE AlienVault 2024-11-18 Modified: 2024-12-18
26
IOCs
MEDIUM VOLUME
The ClickFix social engineering technique, which tricks users into copying and running malicious PowerShell commands, has become increasingly prevalent across the threat landscape. Initially observed in campaigns by TA571 and ClearFake, it is now used by multiple threat actors to deliver various malware types. The technique often employs fake error messages or CAPTCHA checks to deceive users. Recent examples include GitHub notification impersonations delivering Lumma Stealer, Swiss-targeted campaigns distributing AsyncRAT, fake software updates deploying NetSupport RAT, and ChatGPT-themed malvertising delivering XWorm. The technique's popularity stems from its effectiveness in bypassing security measures by exploiting users' desire to resolve issues independently.
MITRE ATT&CK & Malware Families
ATT&CK TECHNIQUES
MALWARE FAMILIES
AsyncRAT Danabot DarkGate Lumma Stealer NetSupport XWorm Brute Ratel C4 Latrodectus Lucky Volunteer
Indicators of Compromise (2 / 26 total)
All domain FileHash-MD5 FileHash-SHA1 FileHash-SHA256 URL hostname
TYPEINDICATORDESCRIPTIONCREATED
FileHash-SHA1 1970de8788c07b548bf04d0062a1d4008196a709 2024-11-18
FileHash-SHA1 890799de73d375478d3a5f0e2b86cec6a0585a91 2024-11-18