«ClickFix» - If a supposed error correction or verification installs malware
The BACS is currently observing an increase in reports of the «ClickFix» infection method. Users are tricked into inserting and executing malicious code into their computer's command line by feigning technical problems. The scam cleverly circumvents technical security measures, as the victims effectively authorize the infection of their system themselves.

Behind the term «ClickFix» lies a sophisticated social engineering tactic. The name «ClickFix» describes a quick solution to a technical problem («fix») that is offered with a simple click («click»). The attackers manipulate legitimate but poorly secured websites or place advertisements that lead to prepared pages. As soon as a person visits the page, a deceptively real-looking overlay window or pop-up window appears.

From the browser to the command line
Damage potential
Advanced method: «CrashFix»
Recommendations
- Be suspicious if websites claim that your browser needs to be updated or that an error can only be rectified by executing commands. Official browser updates are carried out via the browser's internal settings, never via a website.
- Never copy code or commands from unknown sources directly into the «PowerShell», the «Terminal» or the command prompt.
- Do not install any programs from unknown sources.
- Inform employees about this specific scam. Knowing that a website would never ask you to manually enter commands into the system is the best protection.
- In corporate environments, it should be checked whether the execution of «PowerShell» scripts can be restricted for normal users.
- If you have been the victim of such an attack, please report the incident.
Source: BACS
(Visited 99 times, 1 visits today)


