You are the “security vulnerability”: ClickFix is causing users to install malware themselves.

Overview

Amid increasingly sophisticated cyberattacks, a worrying trend is emerging: attackers no longer need to exploit system vulnerabilities—they exploit the users themselves. The ClickFix campaign clearly demonstrates this shift.

Discovered by Recorded Future, ClickFix is a social engineering attack technique where victims are tricked into performing seemingly harmless actions—like copying and running a script—but actually end up inadvertently activating malware on their own devices. No exploit or complex malware is needed from the start; the entire attack chain begins with a simple user action.

What makes ClickFix dangerous is its ability to bypass traditional defense mechanisms. When users themselves execute commands, security solutions like antivirus or EDR often struggle to detect this behavior as malicious. Furthermore, current ClickFix campaigns have expanded from Windows to macOS, clearly indicating a trend toward increasingly sophisticated cross-platform attacks.

Execution flow

1 1776781584

ClickFix campaigns typically follow a clearly structured attack process consisting of four consecutive stages—each step is optimized to exploit user behavior and evade traditional defense mechanisms.

Lure – Entice with Fake Legitimate Interfaces The attack chain begins by deceiving victims through familiar interfaces like fake CAPTCHAs or “human verification” systems. These pages are intricately designed to appear trustworthy and urgent, making users believe they need to perform a simple action to proceed.

Execution – Activation through User Interaction (LotL) After being convinced, victims are instructed to copy and execute an obfuscated script. These commands are typically run via: Run (Windows) or Terminal (Windows/macOS).

Remote Ingress – Download payload from control infrastructure When the command is executed, the system establishes an external connection to download malicious components (payload staging). This process typically uses: Embedded shell, Remote download script. In-Memory Execution – Execute without leaving traces In the final stage, the malware runs directly in memory (in-memory execution) instead of being written to disk. This minimizes forensic traces and helps avoid detection by file-based security tools.

Detailed technical analysis

The ClickFix campaign is divided into several clusters with different approaches and techniques, demonstrating a clear level of targeting and high sophistication in payload deployment.

Cluster 1 – QuickBooks (Targeting accounting users)

This cluster focuses on QuickBooks users, primarily accounting or finance personnel. The attacker uses fake pages requesting “system error fixes” to trick users into executing commands.

2 1776781599

Here, users manually launch PowerShell with Admin rights and run a script designed by the attackers.

3 1776781633

Once the victim executes the command, the malicious payload "bibi.php" is immediately saved in the "%TEMP%" directory as script.ps1. This step initiates the installation process of NetSupport RAT.

4 1776781645

This payload continuously connects to the C2 address: gologpoint[.]com – 62[.]164[.]177[.]230 to receive commands and download other malicious files. During the analysis, experts recorded four additional malicious files, including

Filename SHA-256
at.7z c0af6e9d848ada3839811bf33eeb982e6c207e4c40010418e0185283cd5cff50
lnk.7z 5d821db386c7c879caeabf3e9f94c94a48eec6ec5a3a0efbae9d69da3f52c1db
7z.exe 43907e54cf3d1258f695d1112759b5457576481072cc76a679b8477cfeb3db87
7z.dll b17c3e4058aacdcc36b18858d128d6b3058e0ea607a4dc59eb95b18b7c6acc7c

After NetSupport RAT is installed, the attacker can remotely control the computer, record the screen, manipulate the keyboard, and install additional malware. At this stage, the attacker also extracts all sensitive customer information, including customer details, transaction history, tax information, and financial data.

5 1776781680

Cluster 2 – Booking.com (Fake CAPTCHA Trap)

This cluster targets users of booking services like Booking.com, using fake CAPTCHA techniques to increase credibility. Here, users are asked to verify “NOT A ROOT.”

6 1776781693

Similar to Cluster 1, instead of a real CAPTCHA, the page designed by the attacker will instruct you to open PowerShell and run a command containing the parameter: “-ExecutionPolicy Bypass”.

7 1776781705

With this malicious command, the attacker can disable PowerShell’s security policy, allowing them to download and execute malicious scripts remotely.

Filename SHA-256
at.7z 397dcea810f733494dbe307c91286d08f87f64aebbee787706fe6561ed3e20f8
lnk.7z 5d821db386c7c879caeabf3e9f94c94a48eec6ec5a3a0efbae9d69da3f52c1db
7z.exe 43907e54cf3d1258f695d1112759b5457576481072cc76a679b8477cfeb3db87
7z.dll b17c3e4058aacdcc36b18858d128d6b3058e0ea607a4dc59eb95b18b7c6acc7c

Throughout the execution process, the malware continuously communicates with the C2 to receive commands and store the stolen information.

As mentioned, the danger here is that users believe they are performing a security step, but in reality, they are opening the door for malware to run.

Cluster 3 – Birdeye (Targeting Small Businesses)

This cluster targets small businesses using review platforms like Birdeye. Here, the fake page contains JavaScript designed to evade automated scanning systems (sandbox, crawler).

In this section, the attacker also runs a PowerShell command written in an “obfuscated” form to conceal the true behavior. This is a common technique in cyberattacks or malware to load and execute scripts remotely.

Its main purpose is to download malware remotely from the address https://alababababa.cloud/cVGvQio6.txt and then directly execute the downloaded content on the victim’s computer.

Cluster 4 & 5 – macOS (Exploiting Mac Users)

These clusters focus on macOS users—who are typically less targeted and therefore more likely to let their guard down.

Users are instructed to run the curl command in Terminal: “curl -kfsSL “. The -k parameter is used to bypass TLS certificate checks (potentially a fake server), while the -fsSL parameters download content “silently,” without displaying errors.

The payload will be concealed using hex encoding and base64 encoding, then immediately decoded and executed directly on the machine. After running, the script will download and execute MacSync Stealer. This malware is tasked with stealing browser information, cookies, credentials, and crypto wallet data.

A notable aspect of this infection chain is its ability to attack directly through the Terminal (a trusted interface), cleverly exploiting the perception that “Mac is safer than Windows.”

Conclusion

The ClickFix campaign demonstrates an effective combination of social engineering and cross-platform malware distribution, targeting both Windows and macOS through fake brands like QuickBooks, Booking, or Apple. By tricking users into executing malicious commands themselves, attackers can bypass traditional security mechanisms, deploying malware such as NetSupport RAT and Odyssey Stealer to gain control and steal data.

Recommendation

Recognize and Avoid ClickFix Scams

  • Do not follow the instructions given:
    • Open Run (Win + R), Terminal, or Command Prompt
    • Paste the command provided from the website/email
  • Beware of fake brand websites such as:
    • QuickBooks, Booking, Apple, cryptocurrency sites
  • If you see a message like:
    • “Fix system error”
    • “Verify account”
    • “Install required update”

Do not download or run files from unknown sources.

  • Do not download:
    • File .exe, .dmg, .pkg, .zip from unfamiliar websites
  • Do not install the requested software:
    • Turn off antivirus
    • Grant unusual admin permissions
  • Only download from:
    • Official websites or trusted App Stores

Check the URL before logging in

  • Check the domain carefully:
    • Avoid domains like:
      • account-helpdesk[.]top
      • apple-diagnostic[.]wiki
  • Always:
    • Type the URL manually instead of clicking links
    • Check for HTTPS and certificates

Enable account protection

  • Enable Multi-Factor Authentication (MFA) for:
    • Email
    • Financial accounts (QuickBooks, Booking)
  • Use:
    • Strong passwords, do not reuse
    • Password manager if possible

Update system and software

  • Always update:
    • Windows / macOS
    • Browsers (Chrome, Edge, Safari)

Be cautious with email/phishing

  • Do not click on:
    • Links from unfamiliar emails
    • Attachments from unknown sources
  • Check:
    • Sender (spoofed domain)
    • Pressure content (urgent, scare tactics)

MITRE ATT&CK Mapping

Stage ClickFix MITRE ATT&CK Techniques
Lure T1566 (Phishing)
User Execution T1204, T1059
Obfuscation & LotL T1027, T1218
Payload Delivery T1105, T1071
In-Memory Execution T1620, T1055
Data Theft T1555, T1005
Exfiltration T1041

IOCs

Intuit QuickBooks ClickFix

Domain

4freepics[.]com anthonydee[.]com ariciversonille[.]com bancatangcode[.]com billiardinstitute[.]com cskhga6789[.]com customblindinstall[.]com deinhealthcoach[.]com elive123go[.]com elive777a[.]com extracareliving[.]com fomomforhealth[.]com grandmastertraders[.]traderslinkfx[.]com guypinions[.]com hostmaster[.]extracareliving[.]com mrinmay[.]net ned[.]coveney-ltd[.]com nhacaired88[.]com orkneygateway[.]com quiptly[.]com shopifyservercloud[.]com subsgoal[.]com suedfactoring[.]lit[.]com surecomforts[.]com theinvestworthy[.]com traderslinkfx[.]com ustazazharidrus[.]com visitbundala[.]com yvngvualr[.]com

IP Addresses

45[.]193[.]20[.]50 45[.]193[.]20[.]141 87[.]236[.]16[.]20 94[.]156[.]112[.]115 193[.]35[.]17[.]12 193[.]58[.]122[.]97 193[.]222[.]99[.]212

Staging Domains

nobovcs[.]com quicrob[.]com robovcs[.]com

NetSupport RAT C2

62[.]164[.]177[.]230

File Hashes (NetSupport RAT)

25865914ff0ec9421a5fa7dff2f680498f8893374f24d0b67a735bd8369299e9 280c7fb3033c6c34df88b61a4c90eb03e1ae7d1dc00355ca280a83903b776473 3f8202dacab7371e760e83b7d2b8fbd5d767f5bd408ed713ab0550c83ae82933 52f2813b9a7449946bdb98c171320d1801aa37a65903416c1aa186e44c66d745 56ebaf8922749b9a9a7fa2575f691c53a6170662a8f747faeed11291d475c422

Booking.com ClickFix

Domains

acconthelpdesk[.]com account-help[.]info account-helpdesk[.]icu account-helpdesk[.]info account-helpdesk[.]top accountmime[.]com accountpulse[.]help admin-activitycheck[.]com checkaccountactivity[.]com checkhelpdesk[.]com helpdeskpulse[.]com pulse-help-desk[.]com sign-in-op-token[.]com thepulseactivity[.]com thestayreserve[.]com

IP Address

91[.]1202[.]233[.]206

Staging Domains

bkng-updt[.]com checkpulses[.]com

Staging IPs

77[.]191[.]65[.]131 77[.]191[.]65[.]144

NetSupport RAT C2 Domains

hotelupdatesys[.]com chrm-srv[.]com ms-scedg[.]com

NetSupport RAT C2 IP

152[.]89[.]244[.]70

File Hashes

397dcea810f733494dbe307c91286d08f87f64aebbee787706fe6561ed3e20f8 5d821db386c7c879caeabf3e9f94c94a48eec6ec5a3a0efbae9d69da3f52c1db 43907e54cf3d1258f695d1112759b5457576481072cc76a679b8477cfeb3db87 b17c3e4058aacdcc36b18858d128d6b3058e0ea607a4dc59eb95b18b7c6acc7c

Dual-Platform ClickFix (Windows + macOS)

Domains

appmacintosh[.]com appmacosx[.]com apposx[.]com appsmacosx[.]com appxmacos[.]com cryptoinfnews[.]com cryptoinfo-allnews[.]com cryptoinfo-news[.]com cryptonews-info[.]com financementure[.]com macapp-apple[.]com macapps-apple[.]com macosapp-apple[.]com macosx-app[.]com macosx-apps[.]com macosxapp[.]com macosxappstore[.]com macxapp[.]com macxapp[.]org valetfortesla[.]com

IP Address

45[.]144[.]233[.]192

Staging IPs (Odyssey Stealer C2)

45[.]135[.]232[.]33 217[.]119[.]139[.]117

Hash (Odyssey Stealer)

2e9356948f2214fbf12ab3e873e0057fb64764cb8ed9d1c82e7ab0b3eef92a37

Birdeye ClickFix

Domains

acebirdrep[.]com bebirdrank[.]com birdrankbox[.]com birdrankfx[.]com birdrankgo[.]com birdrankinc[.]com birdrankllc[.]com birdrankmax[.]com birdranktip[.]com birdrankup[.]com birdrankus[.]com birdrankusa[.]com birdrankvip[.]com birdrankzen[.]com birdrepbiz[.]com birdrepgo[.]com birdrephelp[.]com birdreplab[.]com birdrepsys[.]com birdrepusa[.]com birdrepuse[.]com bitbirdrank[.]com bitbirdrep[.]com fixbirdrank[.]com getbirdrank[.]com gobirdrank[.]com helpbirdrank[.]com helpbirdrep[.]com infobirdrep[.]com justbirdrank[.]com mybirdrank[.]com nowbirdrank[.]com optbirdrank[.]com probirdrep[.]com topbirdrank[.]com topbirdrep[.]com usbirdrank[.]com usebirdrep[.]com vipbirdrank[.]com

macOS Storage Cleaning ClickFix

Domains

apple[.]assistance-tools[.]com apple[.]diagnostic[.]wiki mac-os-helper[.]com macintosh-hub[.]com macos-storageperf[.]com stormac[.]lit[.]com

Refer to

New ClickFix Attack Leverage Windows Run Dialog Box and macOS Terminal to Deploy Malware

ClickFix Campaigns Targeting Windows and macOS

Exclusive article by an expert from FPT IS

Luu Tuan Anh – FPT Information Security Center

Share:
Avatar

FPT IS

Img Contact

Sign up to receive the latest news from FPT IS

    Bot Avatar