ClickFix malware tricks you into infecting your own Windows PC

ClickFix is a social engineering trick that hackers have been using more frequently since early 2024 to spread malware. This deceptive tactic fools individuals into running malicious commands on their own computers, ultimately leading to the installation of harmful software. As the attack becomes more prevalent, it is crucial for users to stay informed and protected against this evolving threat.
The latest ClickFix campaign, as reported by KrebsOnSecurity, involves tricking individuals into installing password-stealing malware under the guise of a routine “Verify You Are a Human” test. Initially observed in targeted attacks, this scam has now expanded to affect industries such as hospitality and healthcare. Hackers employ sophisticated techniques to lure victims into executing specific keyboard shortcuts, all while pretending to verify their human identity.
The scam typically begins when a user visits a compromised or malicious website and encounters a fake CAPTCHA-style prompt. Upon clicking the “I’m not a robot” button, the user is instructed to press a series of keyboard shortcuts, including Windows + R and CTRL + V. These commands are designed to copy and execute a malicious script, ultimately leading to the download and installation of malware on the victim’s system.
Phishing emails and malicious websites are commonly used to propagate ClickFix attacks, with hackers impersonating reputable services and organizations to deceive users. The hospitality industry has been a prime target, with attackers posing as Booking.com and sending fake emails containing malicious links. Similarly, healthcare workers have been targeted through compromised websites like HEP2go, where malicious code is embedded to exploit unsuspecting users.
Once ClickFix malware infiltrates a system, it can install various types of harmful software, including password stealers like XWorm, Lumma Stealer, and DanaBot. These malware variants are designed to extract sensitive information such as login credentials and financial data. Additionally, some versions deploy remote access trojans like VenomRAT and AsyncRAT, granting attackers full control over the compromised system.
To safeguard against ClickFix malware and similar threats, users are advised to implement several essential security measures. These include being cautious of CAPTCHA prompts that request unusual actions, avoiding clicking links from unverified emails, enabling two-factor authentication, keeping devices updated, monitoring accounts for suspicious activity, and investing in personal data removal services.
As cybercriminals continue to refine their tactics and exploit human vulnerabilities, it is crucial for individuals to remain vigilant and question any suspicious prompts or emails. By staying informed and taking proactive security measures, users can protect themselves against the threat of ClickFix malware and mitigate the risk of falling victim to malicious attacks.