{"id":24136,"date":"2026-04-21T08:00:40","date_gmt":"2026-04-21T01:00:40","guid":{"rendered":"https:\/\/fpt-is.com\/en\/?post_type=goc_nhin_so&#038;p=24136"},"modified":"2026-04-21T21:39:06","modified_gmt":"2026-04-21T14:39:06","slug":"you-are-the-security-vulnerability-clickfix-is-causing-users-to-install-malware-themselves","status":"publish","type":"goc_nhin_so","link":"https:\/\/fpt-is.com\/en\/insights\/you-are-the-security-vulnerability-clickfix-is-causing-users-to-install-malware-themselves\/","title":{"rendered":"You are the &#8220;security vulnerability&#8221;: ClickFix is causing users to install malware themselves."},"content":{"rendered":"<h2 id=\"overview\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Overview<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Amid increasingly sophisticated cyberattacks, a worrying trend is emerging: attackers no longer need to exploit system vulnerabilities\u2014they exploit the users themselves. The ClickFix campaign clearly demonstrates this shift.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Discovered by Recorded Future, ClickFix is a social engineering attack technique where victims are tricked into performing seemingly harmless actions\u2014like copying and running a script\u2014but actually end up inadvertently activating malware on their own devices. No exploit or complex malware is needed from the start; the entire attack chain begins with a simple user action.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">What makes ClickFix dangerous is its ability to bypass traditional defense mechanisms. When users themselves execute commands, security solutions like antivirus or EDR often struggle to detect this behavior as malicious. Furthermore, current ClickFix campaigns have expanded from Windows to macOS, clearly indicating a trend toward increasingly sophisticated cross-platform attacks.<\/span><\/p>\n<h2 id=\"execution-flow\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Execution flow<\/span><\/h2>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/1-1776781584.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24151\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/1-1776781584.png\" alt=\"1 1776781584\" width=\"1600\" height=\"1129\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/1-1776781584.png 1600w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/1-1776781584-700x494.png 700w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><\/a><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">ClickFix campaigns typically follow a clearly structured attack process consisting of four consecutive stages\u2014each step is optimized to exploit user behavior and evade traditional defense mechanisms.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Lure \u2013 Entice with Fake Legitimate Interfaces<\/strong>\u00a0The attack chain begins by deceiving victims through familiar interfaces like fake CAPTCHAs or &#8220;human verification&#8221; systems. These pages are intricately designed to appear trustworthy and urgent, making users believe they need to perform a simple action to proceed.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Execution \u2013 Activation through User Interaction (LotL)<\/strong>\u00a0After being convinced, victims are instructed to copy and execute an obfuscated script. These commands are typically run via: Run (Windows) or Terminal (Windows\/macOS).<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Remote Ingress \u2013 Download payload from control infrastructure<\/strong>\u00a0When the command is executed, the system establishes an external connection to download malicious components (payload staging). This process typically uses: Embedded shell, Remote download script.\u00a0<strong>In-Memory Execution \u2013 Execute without leaving traces<\/strong>\u00a0In the final stage, the malware runs directly in memory (in-memory execution) instead of being written to disk. This minimizes forensic traces and helps avoid detection by file-based security tools.<\/span><\/p>\n<h2 id=\"detailed-technical-analysis\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Detailed technical analysis<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">The ClickFix campaign is divided into several clusters with different approaches and techniques, demonstrating a clear level of targeting and high sophistication in payload deployment.<\/span><\/p>\n<h3 id=\"cluster-1-quickbooks-targeting-accounting-users\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Cluster 1 \u2013 QuickBooks (Targeting accounting users)<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">This cluster focuses on QuickBooks users, primarily accounting or finance personnel. The attacker uses fake pages requesting &#8220;system error fixes&#8221; to trick users into executing commands.<\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/2-1776781599.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24152\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/2-1776781599.png\" alt=\"2 1776781599\" width=\"1522\" height=\"1162\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/2-1776781599.png 1522w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/2-1776781599-700x534.png 700w\" sizes=\"(max-width: 1522px) 100vw, 1522px\" \/><\/a><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Here, users manually launch PowerShell with Admin rights and run a script designed by the attackers.<\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/3-1776781633.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24153\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/3-1776781633.png\" alt=\"3 1776781633\" width=\"1522\" height=\"758\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/3-1776781633.png 1522w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/3-1776781633-700x349.png 700w\" sizes=\"(max-width: 1522px) 100vw, 1522px\" \/><\/a><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Once the victim executes the command, the malicious payload\u00a0<code>\"bibi.php\"<\/code>\u00a0is immediately saved in the\u00a0<code>\"%TEMP%\"<\/code>\u00a0directory as script.ps1. This step initiates the installation process of NetSupport RAT.<\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/4-1776781645.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24154\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/4-1776781645.png\" alt=\"4 1776781645\" width=\"1508\" height=\"626\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/4-1776781645.png 1508w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/4-1776781645-700x291.png 700w\" sizes=\"(max-width: 1508px) 100vw, 1508px\" \/><\/a><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">This payload continuously connects to the C2 address: gologpoint[.]com &#8211; 62[.]164[.]177[.]230 to receive commands and download other malicious files. During the analysis, experts recorded four additional malicious files, including<\/span><\/p>\n<table>\n<thead>\n<tr>\n<th><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Filename<\/strong><\/span><\/th>\n<th><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>SHA-256<\/strong><\/span><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">at.7z<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">c0af6e9d848ada3839811bf33eeb982e6c207e4c40010418e0185283cd5cff50<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">lnk.7z<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">5d821db386c7c879caeabf3e9f94c94a48eec6ec5a3a0efbae9d69da3f52c1db<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">7z.exe<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">43907e54cf3d1258f695d1112759b5457576481072cc76a679b8477cfeb3db87<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">7z.dll<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">b17c3e4058aacdcc36b18858d128d6b3058e0ea607a4dc59eb95b18b7c6acc7c<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">After NetSupport RAT is installed, the attacker can remotely control the computer, record the screen, manipulate the keyboard, and install additional malware. At this stage, the attacker also extracts all sensitive customer information, including customer details, transaction history, tax information, and financial data.<\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/5-1776781680.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24155\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/5-1776781680.png\" alt=\"5 1776781680\" width=\"1296\" height=\"645\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/5-1776781680.png 1296w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/5-1776781680-700x348.png 700w\" sizes=\"(max-width: 1296px) 100vw, 1296px\" \/><\/a><\/p>\n<h3 id=\"cluster-2-bookingcom-fake-captcha-trap\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Cluster 2 \u2013 Booking.com (Fake CAPTCHA Trap)<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">This cluster targets users of booking services like Booking.com, using fake CAPTCHA techniques to increase credibility. Here, users are asked to verify &#8220;NOT A ROOT.&#8221;<\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/6-1776781693.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24157\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/6-1776781693.png\" alt=\"6 1776781693\" width=\"1298\" height=\"728\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/6-1776781693.png 1298w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/6-1776781693-700x393.png 700w\" sizes=\"(max-width: 1298px) 100vw, 1298px\" \/><\/a><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Similar to Cluster 1, instead of a real CAPTCHA, the page designed by the attacker will instruct you to open PowerShell and run a command containing the parameter: &#8220;-ExecutionPolicy Bypass&#8221;.<\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/7-1776781705.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24158\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/7-1776781705.png\" alt=\"7 1776781705\" width=\"1458\" height=\"246\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/7-1776781705.png 1458w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/7-1776781705-700x118.png 700w\" sizes=\"(max-width: 1458px) 100vw, 1458px\" \/><\/a><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">With this malicious command, the attacker can disable PowerShell&#8217;s security policy, allowing them to download and execute malicious scripts remotely.<\/span><\/p>\n<table>\n<thead>\n<tr>\n<th><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Filename<\/strong><\/span><\/th>\n<th><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>SHA-256<\/strong><\/span><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">at.7z<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">397dcea810f733494dbe307c91286d08f87f64aebbee787706fe6561ed3e20f8<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">lnk.7z<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">5d821db386c7c879caeabf3e9f94c94a48eec6ec5a3a0efbae9d69da3f52c1db<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">7z.exe<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">43907e54cf3d1258f695d1112759b5457576481072cc76a679b8477cfeb3db87<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">7z.dll<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">b17c3e4058aacdcc36b18858d128d6b3058e0ea607a4dc59eb95b18b7c6acc7c<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Throughout the execution process, the malware continuously communicates with the C2 to receive commands and store the stolen information.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><img decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hashnode.com\/uploads\/covers\/6777abffdb647396c7d71de4\/a3cd7076-0a4e-4637-a691-81544a3fe8ea.png\" alt=\"\" width=\"550\" height=\"289\" \/><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">As mentioned, the danger here is that users believe they are performing a security step, but in reality, they are opening the door for malware to run.<\/span><\/p>\n<h3 id=\"cluster-3-birdeye-targeting-small-businesses\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Cluster 3 \u2013 Birdeye (Targeting Small Businesses)<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">This cluster targets small businesses using review platforms like Birdeye. Here, the fake page contains JavaScript designed to evade automated scanning systems (sandbox, crawler).<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><img decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hashnode.com\/uploads\/covers\/6777abffdb647396c7d71de4\/48e0ff4e-f05a-4e0b-9f19-355e426bf148.png\" alt=\"\" width=\"922\" height=\"691\" \/><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><img decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hashnode.com\/uploads\/covers\/6777abffdb647396c7d71de4\/fe692233-c6e9-4c52-a1df-9696a50a30a0.png\" alt=\"\" width=\"855\" height=\"602\" \/><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">In this section, the attacker also runs a PowerShell command written in an &#8220;obfuscated&#8221; form to conceal the true behavior. This is a common technique in cyberattacks or malware to load and execute scripts remotely.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><img decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hashnode.com\/uploads\/covers\/6777abffdb647396c7d71de4\/e40fb76b-15c2-4677-a57c-51173090ed78.png\" alt=\"\" width=\"1039\" height=\"169\" \/><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Its main purpose is to download malware remotely from the address\u00a0<a href=\"https:\/\/alababababa.cloud\/cVGvQio6.txt\" target=\"_blank\" rel=\"noopener ugc nofollow\">https:\/\/alababababa.cloud\/cVGvQio6.txt<\/a>\u00a0and then directly execute the downloaded content on the victim&#8217;s computer.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><img decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hashnode.com\/uploads\/covers\/6777abffdb647396c7d71de4\/59338982-6514-4339-adbd-c70feb800e28.png\" alt=\"\" width=\"967\" height=\"480\" \/><\/span><\/p>\n<h3 id=\"cluster-4-amp-5-macos-exploiting-mac-users\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Cluster 4 &amp; 5 \u2013 macOS (Exploiting Mac Users)<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">These clusters focus on macOS users\u2014who are typically less targeted and therefore more likely to let their guard down.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><img decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hashnode.com\/uploads\/covers\/6777abffdb647396c7d71de4\/7836ce4a-4a23-4bd4-9633-068760eb7a1e.png\" alt=\"\" width=\"983\" height=\"738\" \/><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Users are instructed to run the curl command in Terminal: &#8220;curl -kfsSL &#8220;. The -k parameter is used to bypass TLS certificate checks (potentially a fake server), while the -fsSL parameters download content &#8220;silently,&#8221; without displaying errors.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><img decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hashnode.com\/uploads\/covers\/6777abffdb647396c7d71de4\/b2bcf2ba-5c73-4b42-a93e-37f6dc88a831.png\" alt=\"\" width=\"1014\" height=\"176\" \/><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">The payload will be concealed using hex encoding and base64 encoding, then immediately decoded and executed directly on the machine. After running, the script will download and execute MacSync Stealer. This malware is tasked with stealing browser information, cookies, credentials, and crypto wallet data.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">A notable aspect of this infection chain is its ability to attack directly through the Terminal (a trusted interface), cleverly exploiting the perception that &#8220;Mac is safer than Windows.&#8221;<\/span><\/p>\n<h2 id=\"conclusion\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Conclusion<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">The ClickFix campaign demonstrates an effective combination of social engineering and cross-platform malware distribution, targeting both Windows and macOS through fake brands like QuickBooks, Booking, or Apple. By tricking users into executing malicious commands themselves, attackers can bypass traditional security mechanisms, deploying malware such as NetSupport RAT and Odyssey Stealer to gain control and steal data.<\/span><\/p>\n<h2 id=\"recommendation\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Recommendation<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Recognize and Avoid ClickFix Scams<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Do not follow the instructions given:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Open Run (Win + R), Terminal, or Command Prompt<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Paste the command provided from the website\/email<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Beware of fake brand websites such as:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">QuickBooks, Booking, Apple, cryptocurrency sites<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">If you see a message like:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">&#8220;Fix system error&#8221;<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">&#8220;Verify account&#8221;<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">&#8220;Install required update&#8221;<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Do not download or run files from unknown sources.<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Do not download:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">File .exe, .dmg, .pkg, .zip from unfamiliar websites<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Do not install the requested software:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Turn off antivirus<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Grant unusual admin permissions<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Only download from:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Official websites or trusted App Stores<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Check the URL before logging in<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Check the domain carefully:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Avoid domains like:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><code>account-helpdesk[.]top<\/code><\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><code>apple-diagnostic[.]wiki<\/code><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Always:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Type the URL manually instead of clicking links<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Check for HTTPS and certificates<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Enable account protection<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Enable Multi-Factor Authentication (MFA) for:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Email<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Financial accounts (QuickBooks, Booking)<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Use:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Strong passwords, do not reuse<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Password manager if possible<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Update system and software<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Always update:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Windows \/ macOS<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Browsers (Chrome, Edge, Safari)<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Be cautious with email\/phishing<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Do not click on:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Links from unfamiliar emails<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Attachments from unknown sources<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Check:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Sender (spoofed domain)<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Pressure content (urgent, scare tactics)<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2 id=\"mitre-attampck-mapping\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>MITRE ATT&amp;CK Mapping<\/strong><\/span><\/h2>\n<table>\n<thead>\n<tr>\n<th><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Stage ClickFix<\/span><\/th>\n<th><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">MITRE ATT&amp;CK Techniques<\/span><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Lure<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1566 (Phishing)<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">User Execution<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1204, T1059<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Obfuscation &amp; LotL<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1027, T1218<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Payload Delivery<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1105, T1071<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">In-Memory Execution<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1620, T1055<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Data Theft<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1555, T1005<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Exfiltration<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1041<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"iocs\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">IOCs<\/span><\/h2>\n<h3 id=\"intuit-quickbooks-clickfix\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Intuit QuickBooks ClickFix<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Domain<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">4freepics[.]com anthonydee[.]com ariciversonille[.]com bancatangcode[.]com billiardinstitute[.]com cskhga6789[.]com customblindinstall[.]com deinhealthcoach[.]com elive123go[.]com elive777a[.]com extracareliving[.]com fomomforhealth[.]com grandmastertraders[.]traderslinkfx[.]com guypinions[.]com hostmaster[.]extracareliving[.]com mrinmay[.]net ned[.]coveney-ltd[.]com nhacaired88[.]com orkneygateway[.]com quiptly[.]com shopifyservercloud[.]com subsgoal[.]com suedfactoring[.]lit[.]com surecomforts[.]com theinvestworthy[.]com traderslinkfx[.]com ustazazharidrus[.]com visitbundala[.]com yvngvualr[.]com<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>IP Addresses<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">45[.]193[.]20[.]50 45[.]193[.]20[.]141 87[.]236[.]16[.]20 94[.]156[.]112[.]115 193[.]35[.]17[.]12 193[.]58[.]122[.]97 193[.]222[.]99[.]212<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Staging Domains<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">nobovcs[.]com quicrob[.]com robovcs[.]com<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>NetSupport RAT C2<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">62[.]164[.]177[.]230<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>File Hashes (NetSupport RAT)<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">25865914ff0ec9421a5fa7dff2f680498f8893374f24d0b67a735bd8369299e9 280c7fb3033c6c34df88b61a4c90eb03e1ae7d1dc00355ca280a83903b776473 3f8202dacab7371e760e83b7d2b8fbd5d767f5bd408ed713ab0550c83ae82933 52f2813b9a7449946bdb98c171320d1801aa37a65903416c1aa186e44c66d745 56ebaf8922749b9a9a7fa2575f691c53a6170662a8f747faeed11291d475c422<\/span><\/p>\n<h3 id=\"bookingcom-clickfix\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Booking.com ClickFix<\/strong><\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Domains<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">acconthelpdesk[.]com account-help[.]info account-helpdesk[.]icu account-helpdesk[.]info account-helpdesk[.]top accountmime[.]com accountpulse[.]help admin-activitycheck[.]com checkaccountactivity[.]com checkhelpdesk[.]com helpdeskpulse[.]com pulse-help-desk[.]com sign-in-op-token[.]com thepulseactivity[.]com thestayreserve[.]com<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>IP Address<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">91[.]1202[.]233[.]206<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Staging Domains<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">bkng-updt[.]com checkpulses[.]com<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Staging IPs<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">77[.]191[.]65[.]131 77[.]191[.]65[.]144<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>NetSupport RAT C2 Domains<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">hotelupdatesys[.]com chrm-srv[.]com ms-scedg[.]com<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>NetSupport RAT C2 IP<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">152[.]89[.]244[.]70<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>File Hashes<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">397dcea810f733494dbe307c91286d08f87f64aebbee787706fe6561ed3e20f8 5d821db386c7c879caeabf3e9f94c94a48eec6ec5a3a0efbae9d69da3f52c1db 43907e54cf3d1258f695d1112759b5457576481072cc76a679b8477cfeb3db87 b17c3e4058aacdcc36b18858d128d6b3058e0ea607a4dc59eb95b18b7c6acc7c<\/span><\/p>\n<h3 id=\"dual-platform-clickfix-windows-macos\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Dual-Platform ClickFix (Windows + macOS)<\/strong><\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Domains<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">appmacintosh[.]com appmacosx[.]com apposx[.]com appsmacosx[.]com appxmacos[.]com cryptoinfnews[.]com cryptoinfo-allnews[.]com cryptoinfo-news[.]com cryptonews-info[.]com financementure[.]com macapp-apple[.]com macapps-apple[.]com macosapp-apple[.]com macosx-app[.]com macosx-apps[.]com macosxapp[.]com macosxappstore[.]com macxapp[.]com macxapp[.]org valetfortesla[.]com<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>IP Address<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">45[.]144[.]233[.]192<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Staging IPs (Odyssey Stealer C2)<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">45[.]135[.]232[.]33 217[.]119[.]139[.]117<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Hash (Odyssey Stealer)<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">2e9356948f2214fbf12ab3e873e0057fb64764cb8ed9d1c82e7ab0b3eef92a37<\/span><\/p>\n<h3 id=\"birdeye-clickfix\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Birdeye ClickFix<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Domains<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">acebirdrep[.]com bebirdrank[.]com birdrankbox[.]com birdrankfx[.]com birdrankgo[.]com birdrankinc[.]com birdrankllc[.]com birdrankmax[.]com birdranktip[.]com birdrankup[.]com birdrankus[.]com birdrankusa[.]com birdrankvip[.]com birdrankzen[.]com birdrepbiz[.]com birdrepgo[.]com birdrephelp[.]com birdreplab[.]com birdrepsys[.]com birdrepusa[.]com birdrepuse[.]com bitbirdrank[.]com bitbirdrep[.]com fixbirdrank[.]com getbirdrank[.]com gobirdrank[.]com helpbirdrank[.]com helpbirdrep[.]com infobirdrep[.]com justbirdrank[.]com mybirdrank[.]com nowbirdrank[.]com optbirdrank[.]com probirdrep[.]com topbirdrank[.]com topbirdrep[.]com usbirdrank[.]com usebirdrep[.]com vipbirdrank[.]com<\/span><\/p>\n<h3 id=\"macos-storage-cleaning-clickfix\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>macOS Storage Cleaning ClickFix<\/strong><\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Domains<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">apple[.]assistance-tools[.]com apple[.]diagnostic[.]wiki mac-os-helper[.]com macintosh-hub[.]com macos-storageperf[.]com stormac[.]lit[.]com<\/span><\/p>\n<h2 id=\"refer-to\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Refer to<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><a href=\"https:\/\/cybersecuritynews.com\/new-clickfix-attack-leverage-windows-run-dialog-box\/#google_vignette\" target=\"_blank\" rel=\"noopener ugc nofollow\">New ClickFix Attack Leverage Windows Run Dialog Box and macOS Terminal to Deploy Malware<\/a><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><a href=\"https:\/\/www.recordedfuture.com\/research\/clickfix-campaigns-targeting-windows-and-macos\" target=\"_blank\" rel=\"noopener ugc nofollow\">ClickFix Campaigns Targeting Windows and macOS<\/a><\/span><\/p>\n<table style=\"border-collapse: collapse;width: 98.5865%;height: 5px\">\n<tbody>\n<tr>\n<td style=\"width: 100%\">\n<p data-start=\"0\" data-end=\"44\"><strong><span style=\"font-family: arial, helvetica, sans-serif\">Exclusive article by an expert from FPT IS<\/span><\/strong><\/p>\n<p data-start=\"46\" data-end=\"92\" data-is-last-node=\"\" data-is-only-node=\"\"><em><span style=\"font-family: arial, helvetica, sans-serif\">Luu Tuan Anh \u2013 FPT Information Security Center<\/span><\/em><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"author":21,"featured_media":24138,"parent":0,"template":"","nang_luc":[],"danh_muc_goc_nhin_so":[],"dich_vu":[],"linh_vuc":[],"platform":[],"san_pham":[],"the_goc_nhin_so":[],"class_list":["post-24136","goc_nhin_so","type-goc_nhin_so","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/goc_nhin_so\/24136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/goc_nhin_so"}],"about":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/types\/goc_nhin_so"}],"author":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/users\/21"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/media\/24138"}],"wp:attachment":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/media?parent=24136"}],"wp:term":[{"taxonomy":"nang_luc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/nang_luc?post=24136"},{"taxonomy":"danh_muc_goc_nhin_so","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/danh_muc_goc_nhin_so?post=24136"},{"taxonomy":"dich_vu","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/dich_vu?post=24136"},{"taxonomy":"linh_vuc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/linh_vuc?post=24136"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/platform?post=24136"},{"taxonomy":"san_pham","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/san_pham?post=24136"},{"taxonomy":"the_goc_nhin_so","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/the_goc_nhin_so?post=24136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}