Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Rise of ClickFix: A New Form of Malware That's Bypassing Endpoint Protections



ClickFix: The Stealthy Scam That's Infiltrating Your Computer
In a bid to evade detection, malicious actors have developed a new method of infiltrating computers through seemingly innocuous links and emails. ClickFix, a relatively unknown threat, has been gaining traction in recent months, targeting both macOS and Windows users with its sophisticated techniques.


  • ClickFix is a new malware threat that has already gained attention for its sophisticated techniques.
  • The malware operates by sending out fake emails or WhatsApp messages with links that direct users to malicious websites.
  • The malware instructs users to copy and paste text into an unfamiliar terminal window, which downloads malware onto their device.
  • ClickFix has bypassed many endpoint protections, including Microsoft Defender, due to its encoded payloads.
  • The attackers adapt their tactics depending on the device being used, making it harder for security tools to detect.
  • Lack of awareness among users is a significant factor driving the growth of ClickFix scams.
  • Users should educate themselves about potential tactics used by malicious actors and remain vigilant when interacting with unfamiliar links or emails.
  • Taking extra precautions during peak holiday seasons, such as using strong passwords and keeping software up-to-date, can help minimize the risk of falling victim to this threat.



  • ClickFix, the latest iteration of malicious software designed to infiltrate computers, has been gaining attention in recent months. Despite being a relatively new threat, its impact is already being felt, with security experts warning of its potential to pose a significant risk to individuals and organizations alike.

    According to reports from various cybersecurity firms, including CrowdStrike and Push Security, ClickFix operates by sending out emails or WhatsApp messages that appear to be from legitimate sources, such as hotels or online travel services. These messages often contain links that, when clicked, direct the user to a malicious website that presents a CAPTCHA challenge or other pretext requiring user confirmation.

    The user is then instructed to copy a string of text and paste it into an unfamiliar terminal window, which they may not even be aware exists on their computer. Once entered, this string of text causes the PC or Mac to surreptitiously visit a scammer-controlled server and download malware, which automatically installs itself without any indication to the target.

    This sophisticated technique has already proven effective in bypassing many endpoint protections, including those offered by Microsoft Defender and other security software. In fact, some malicious payloads are encoded in base-64 format, making them unreadable to humans but not detectable by most security tools that rely on sandboxing techniques to flag potentially malicious actions.

    The attackers behind ClickFix campaigns have also been known to adapt their tactics depending on the device being used, with some pages delivering payloads for Windows or macOS. In one notable example, Push Security reported a campaign where the page delivered LOLbins, binaries that use living off the land technique, relying solely on native capabilities built into the operating system.

    These scripts are often executed inside the browser sandbox, which is designed to protect devices from malware or harmful scripts. However, in this case, security tools are unable to observe and flag these actions as potentially malicious due to their base-64 encoding and sandboxing techniques.

    The lack of awareness among users is also a significant factor driving the growth of ClickFix scams. Many people have learned to be suspicious of links in emails or messengers but not necessarily of sites that instruct them to copy a piece of text and paste it into an unfamiliar window.

    As families gather in the coming weeks for various holiday dinners, it's essential to remind loved ones about security advice. While endpoint protection programs can offer some defenses against these attacks, they may not be enough to prevent ClickFix from bypassing their protections in some cases.

    In this light, awareness is undoubtedly the best countermeasure against ClickFix and similar threats. It's crucial for individuals to educate themselves on potential tactics used by malicious actors and to remain vigilant when interacting with unfamiliar links or emails.

    Furthermore, security experts recommend that users take extra precautions during peak holiday seasons, such as using strong passwords, keeping software up-to-date, and avoiding suspicious emails or messages altogether.

    As the threat landscape continues to evolve, it's essential for individuals and organizations alike to stay informed about emerging threats like ClickFix. By understanding these tactics and taking proactive measures to protect themselves, users can minimize the risk of falling victim to this stealthy scam.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-Rise-of-ClickFix-A-New-Form-of-Malware-Thats-Bypassing-Endpoint-Protections-ehn.shtml

  • https://arstechnica.com/security/2025/11/clickfix-may-be-the-biggest-security-threat-your-family-has-never-heard-of/


  • Published: Tue Nov 11 07:21:46 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us