Huntress, Microsoft Detail the Continued Popularity, Evolution of ClickFix Attacks
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内,并且不需要特定的开头。首先,我得仔细阅读用户提供的文章内容,理解其主要信息。 文章主要讲的是ClickFix攻击方法在2025年上半年的使用量激增了500%,成为仅次于钓鱼攻击的第二大网络威胁。ESET和Huntress等安全公司都对此进行了报道。ClickFix通过诱骗用户复制粘贴恶意命令,绕过传统安全控制,传播多种恶意软件,包括勒索软件和间谍软件。 接下来,我需要提取关键点:ClickFix的增长率、它成为第二大攻击手段、诱骗用户执行命令的方式、绕过安全控制的特点以及传播的恶意软件类型。同时,文章还提到了一些具体的案例,比如Matanbuchus 3.0和CrashFix方法。 现在,我需要用简洁的语言把这些要点整合起来,确保在100字以内。要注意用词准确,涵盖主要信息而不遗漏关键细节。例如,“激增500%”、“第二大攻击手段”、“诱骗用户执行恶意命令”、“传播多种恶意软件”等。 最后,检查字数是否符合要求,并确保语句通顺自然。 </think> ClickFix攻击方法在2025年上半年激增500%,成为仅次于钓鱼攻击的第二大网络威胁。该技术通过诱骗用户复制粘贴恶意命令绕过传统安全控制,并传播多种恶意软件。 2026-2-19 16:38:21 Author: securityboulevard.com(查看原文) 阅读量:4 收藏

Researchers with cybersecurity firm ESET last year reported that the use of ClickFix methods in attacks grew more than 500% during the first half of 2025 compared with the last six months of the year before, accounting for almost 8% of attacks blocked by the firm during that time and becoming the second most common attack vector after phishing.

It was a surprising development for a cyber threat that had only emerged in late 2023, though it echoed what other security vendors have found in recent months, not only with the use of ClickFix in campaigns but also in its rapid evolution.

“The payloads at the end of ClickFix attacks vary widely – from infostealers to ransomware and even to nation-state malware – making this a versatile and formidable threat across Windows, Linux, and macOS,” wrote Jiří Kropáč, director of ESET’s Threat Prevention Labs.

In a report this week, Huntress security researchers Anna Pham and Michael Tigges called ClickFix “the social engineering technique that just won’t die.”

“ClickFix became one of the most prevalent initial access methods in 2025, adopted by both cybercriminal and nation-state actors alike,” Pham and Tigges wrote. “The technique tricks victims into copying and pasting malicious commands into their own systems, effectively turning users into the delivery mechanism and bypassing traditional email-based security controls entirely.”

Dropping Matanbuchus 3.0 Malware

Huntress is one of several security firms that have reported on ClickFix campaigns this month and the ongoing development efforts by the threat groups behind them. The vendor detailed a ClickFix infection that delivers the Matanbuchus 3.0 malware-as-a-service (MaaS) loader that has been sold on Russian-speaking underground forums since February 2021.

Previous Matanbuchus variants have delivered such payloads as Cobalt Strike, QakBot, DanaBot, the Rhadamanthys stealer, and NetSupport RAT, according to Pham and Tigges. Version 3.0 is a rewrite of the loader’s codebase and – based on its price of $10,000 to $15,000 a month – is used for high-value and targeted attacks rather than mass campaigns. In addition, it delivers a custom implant Huntress is calling AstarionRAT that the researchers hadn’t seen before, with its eventual goal being to deploy ransomware or exfiltrate data from victims’ systems.

The attack starts with a ClickFix push that includes brand impersonation, which includes combining fragments of recognizable security and cloud brand names to create fabricated but plausible-sounding service names. It then uses a prompt instructing the victim to execute a command, which deploys an MSI installer that drops Matanbuchus 3.0.

Microsoft and the DNS Lookup Tactic

Meanwhile, Microsoft Threat Intelligence wrote about a ClickFix campaign that asks “targets to run a command that executes a custom DNS lookup and parses the `Name:` response to receive the next-stage payload for execution.” The use of DNS lookups is a new twist in a technique that in the past has usually relied on messages regarding fixing errors or installing updates to get users to inadvertently execute malicious commands.

Pieter Arntz, malware analyst at Malwarebytes, wrote that “apparently, the criminals behind these campaigns have figured out that mshta and Powershell commands are increasingly being blocked by security software, so they have developed a new method using nslookup.”

With the new method, users are lured into running an nslookup command that goes to a DNS server that is controlled by the bad actor rather than the default DNS server on the victim’s system.

“The initial stages are pretty much the same as we have seen before: fake CAPTCHA instructions to prove you’re not a bot, solving non-existing computer problems or updates, causing browser crashes, and even instruction videos,” Arntz wrote. “Nslookup is a built‑in tool to use the internet ‘phonebook,’ and the criminals are basically abusing that phonebook to smuggle in instructions and malware instead of just getting an address.”

Leveraging nslookup

Nslookup is used to troubleshoot network problems, check if DNS is configured correctly, and investigate domains, he wrote. It’s not typically used to download or run programs. However, in this case, the bad actors “configured a server to reply with data that is crafted so that part of the ‘answer’ is actually another command or a pointer to malware, not just a normal IP address,” Arntz added.

That sets in motion an attack that includes downloading a ZIP archive from the external server, extracting a malicious Python script from the archive to run reconnaissance and discovery commands. It drops a Visual Basic script, which then drops and executes ModeloRAT, a Python-based remote access trojan (RAT) that gives bad actors control of the infected Windows system.

“Long story short, the cybercriminals have found yet another way to use a trusted technical tool and make it secretly carry the next step of the attack, all triggered by the victim following what looks like harmless copy‑paste support instructions,” Arntz wrote. “At which point they might hand over the control over their system.”

The New ‘CrashFix’ Method

The report came a couple of weeks after Microsoft wrote about a ClickFix campaign that uses a ploy that it called “CrashFix,” in which the threat actors deliberately crash victims’ browsers and then entice users to execute a malicious command by convincing them that doing so would fix the browser problem. The researchers wrote that “This variant represents a notable escalation in ClickFix tradecraft, combining user disruption with social engineering to increase execution success while reducing reliance on traditional exploit techniques.”

Also earlier this month, analysts with Intego Antivirus Labs wrote about a new ClickFix campaign called “Matryoshka” that’s aimed at macOS users that uses a fake installation and fix push to trick targets into executing a malicious Terminal command.

“While the ClickFix tactic is not new, this campaign introduces stronger evasion techniques – including an in-memory, compressed wrapper and API-gated network communications — designed to hinder static analysis and automated sandboxes,” they wrote. “At a high level, the attack relies on typosquatting and redirect infrastructure to deliver a ‘paste this fix’ prompt. Once executed, a loader retrieves an AppleScript payload that attempts to harvest browser credentials and target crypto wallet applications.”

Recent Articles By Author


文章来源: https://securityboulevard.com/2026/02/huntress-microsoft-detail-the-continued-popularity-evolution-of-clickfix-attacks/
如有侵权请联系:admin#unsafe.sh