Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

iClicker Site Hack: A Classic Case of ClickFix Social Engineering




The iClicker site was hacked in a ClickFix attack that targeted students with malware via fake CAPTCHA, but fortunately, no iClicker data or operations were impacted. The incident serves as a reminder for users to be cautious when interacting with unfamiliar websites and CAPTCHAs, and to always verify the authenticity of any request before entering sensitive information.



  • iClicker, a popular digital classroom tool, was compromised in a ClickFix attack that targeted students with malware via fake CAPTCHA.
  • The attack occurred between April 12 and April 16, 2025, and used social engineering tactics to trick users into installing malware on their devices.
  • The malware downloaded by the attackers was tailored to specific types of visitors, with some versions targeting students and others attempting to steal credentials from college networks.
  • The attack highlighted the importance of security measures, such as running security software, immediately changing passwords, and using a password manager like BitWarden or 1Password.
  • The iClicker hack was not an isolated incident, but part of a larger trend of supply chain attacks that have been on the rise in recent years.



  • iClicker, a popular digital classroom tool widely used by 5,000 instructors and 7 million students at colleges and universities across the United States, has been compromised in a ClickFix attack that targeted students with malware via fake CAPTCHA. The attack, which occurred between April 12 and April 16, 2025, was a prime example of the growing threat of social engineering attacks, which continue to be a significant concern for organizations and individuals alike.

    The iClicker site was hacked when an unrelated third party placed a false Captcha on the platform's landing page before users logged in. The fake CAPTCHA prompt instructed users to press "I'm not a robot" to verify themselves, but in reality, it was a ploy to trick students and instructors into installing malware on their devices. When visitors clicked on the verification prompt, a PowerShell script was silently copied into the Windows clipboard, which was then executed by pressing Enter.

    The ClickFix attack was a classic example of social engineering, where the attacker used a fake CAPTCHA to trick users into taking an action that compromised their security. The attack was further complicated by the fact that the malware downloaded was tailored to specific types of visitors, with some versions targeting students and others attempting to steal credentials from college networks.

    According to Lawrence Abrams, the owner and Editor in Chief of BleepingComputer.com, ClickFix attacks have become widespread social engineering tactics used in numerous malware campaigns. The attack likely distributed an infostealer, which can steal cookies, credentials, passwords, credit cards, and browsing history from popular browsers like Google Chrome, Microsoft Edge, Mozilla Firefox, and others.

    The stolen data was collected into an archive and sent back to the attacker, where it could be used in further attacks or sold on cybercrime marketplaces. The attack also highlighted the importance of security measures, such as running security software, immediately changing passwords, and using a password manager like BitWarden or 1Password.

    The iClicker hack was not an isolated incident, but rather part of a larger trend of supply chain attacks that have been on the rise in recent years. These attacks involve compromising companies' supply chains to introduce malware into their software, often without the company even realizing it.

    In this case, BleepingComputer discovered that iClicker had published a security bulletin on its website, but it included a meta tag that prevented search engines from indexing the document. This made it more difficult for users to find information about the incident.

    The University of Michigan's Safe Computing team reported the incident and urged faculty and students who encountered the fake CAPTCHA during this time period to run security software, change their passwords, and monitor their devices for any signs of malware.

    In response to the attack, iClicker stated that it had resolved an unrelated third-party placed a false Captcha on its landing page. The company also recommended that any faculty or student who encountered and clicked on the false Captcha from April 12-16 run security software to ensure their devices remain protected.

    While ClickFix attacks have become widespread social engineering tactics, there are steps you can take to protect yourself:

    1. Run security software: Immediately install and run antivirus software to scan your device for any signs of malware.
    2. Change passwords: If you changed your password during the incident, but still want to be cautious, change all passwords stored on your computer to a unique one for every site.
    3. Use a password manager: Consider using a reputable password manager like BitWarden or 1Password to generate and store unique, complex passwords.
    4. Be cautious of fake CAPTCHAs: Always verify the authenticity of any Captcha request before entering sensitive information.

    In conclusion, the iClicker hack was a classic example of a ClickFix social engineering attack that targeted students with malware via fake CAPTCHA. The attack highlighted the growing threat of supply chain attacks and the importance of security measures to protect against such threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/iClicker-Site-Hack-A-Classic-Case-of-ClickFix-Social-Engineering-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/iclicker-hack-targeted-students-with-malware-via-fake-captcha/

  • https://safecomputing.umich.edu/security-alerts/iclicker-fake-captcha-installs-malware


  • Published: Sun May 11 11:19:03 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us