Hackers Exploit ClickFix Tactic to Gain Full Control Over Windows Machines

A new phishing campaign is targeting Windows users with a deceptive technique called ClickFix, tricking victims into executing malicious PowerShell commands. The attack, active since March 2025, deploys a modified version of the Havoc command-and-control (C2) framework through SharePoint abuse, allowing attackers to take full control of compromised systems.
- Hackers send phishing emails disguised as urgent document notifications. Victims are instructed to copy and paste a PowerShell command to fix a fake error message.
- The PowerShell script retrieves a malicious payload from a SharePoint link controlled by attackers, bypassing traditional security measures.
- The malware checks for sandbox environments, establishes persistence, and downloads a Python interpreter if necessary. It then loads a hidden malicious DLL without leaving traces on disk.
- The final payload is a modified Havoc post-exploitation tool, which masks its traffic using Microsoft Graph API to blend with legitimate cloud service activity.
- The malware uses AES-256 encryption and SharePoint API calls to send stolen data and receive attacker commands, erasing traces immediately after execution.
- Fortinet has issued security signatures to block the attack chain and advises organizations to train employees, monitor SharePoint activity, and restrict PowerShell execution to prevent exploitation
This attack highlights the growing sophistication of phishing campaigns that combine social engineering, open-source malware, and cloud abuse to evade detection. Organizations must stay vigilant, monitor cloud API usage, and implement strict PowerShell execution policies to defend against such threats.
Stay Secure with Net Protector Cyber Security!
Comment(s)
Categories
- Other (42)
- Ransomware (136)
- Events and News (27)
- Features (45)
- Security (453)
- Tips (79)
- Google (23)
- Achievements (10)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (43)
- Malware Alerts (200)
- Cyber Attack (246)
- Data Backup (11)
- Data Breach (92)
- Phishing (152)
- Securty Tips (1)
- Browser Hijack (17)
- Adware (15)
- Email And Password (67)
- Android Security (63)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (56)
- Hacker (31)
- Spyware (9)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (4)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (6)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (11)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (2)
- DMart (1)
- Payment Risk (4)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (8)
- Impersonation phishing (1)
- DDoS (5)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)
Recent Posts
Archive
Tags
cyber attack
phishing
data breach
ransomware
cyber threats
ransomeware
phishing attacks
android malware
financial security
data theft
cyber security
phishing attack
malware
cybercrime
data stealing
network security
phishingattack
data protection
twitter
data security
critical vulnerability
cyber fraud
cyber threat
trojan
cyberthreats
cert-in
financial fraud
phishing email
microsoft
cybercriminals
ddos
phishing scam
lockbit
india
ddos attack
winrar
email phishing
clop
android
server security
clop gang
cryptojacking
malicious apps
december cyber attacks
android apps
ransomware attacks
ransomware attack
pakistan-backed hacker
play store
databreach