Hackers Exploit ClickFix Tactic to Gain Full Control Over Windows Machines

A new phishing campaign is targeting Windows users with a deceptive technique called ClickFix, tricking victims into executing malicious PowerShell commands. The attack, active since March 2025, deploys a modified version of the Havoc command-and-control (C2) framework through SharePoint abuse, allowing attackers to take full control of compromised systems.
- Hackers send phishing emails disguised as urgent document notifications. Victims are instructed to copy and paste a PowerShell command to fix a fake error message.
- The PowerShell script retrieves a malicious payload from a SharePoint link controlled by attackers, bypassing traditional security measures.
- The malware checks for sandbox environments, establishes persistence, and downloads a Python interpreter if necessary. It then loads a hidden malicious DLL without leaving traces on disk.
- The final payload is a modified Havoc post-exploitation tool, which masks its traffic using Microsoft Graph API to blend with legitimate cloud service activity.
- The malware uses AES-256 encryption and SharePoint API calls to send stolen data and receive attacker commands, erasing traces immediately after execution.
- Fortinet has issued security signatures to block the attack chain and advises organizations to train employees, monitor SharePoint activity, and restrict PowerShell execution to prevent exploitation
This attack highlights the growing sophistication of phishing campaigns that combine social engineering, open-source malware, and cloud abuse to evade detection. Organizations must stay vigilant, monitor cloud API usage, and implement strict PowerShell execution policies to defend against such threats.
Stay Secure with Net Protector Cyber Security!
Comment(s)
Categories
- Other (42)
- Ransomware (151)
- Events and News (27)
- Features (45)
- Security (478)
- Tips (79)
- Google (24)
- Achievements (11)
- Products (34)
- Activation (7)
- Dealers (1)
- Bank Phishing (45)
- Malware Alerts (220)
- Cyber Attack (271)
- Data Backup (12)
- Data Breach (107)
- Phishing (160)
- Securty Tips (2)
- Browser Hijack (19)
- Adware (15)
- Email And Password (69)
- Android Security (71)
- Knoweldgebase (38)
- Botnet (16)
- Updates (3)
- Alert (71)
- Hacking (58)
- Social Media (8)
- vulnerability (59)
- Hacker (32)
- Spyware (11)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (3)
- Website hacks (6)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (7)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (5)
- Amazon (2)
- DMart (1)
- Payment Risk (4)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (12)
- Impersonation phishing (1)
- DDoS (7)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)
Recent Posts
Archive
Tags
cyber attack
phishing
data breach
phishing attacks
cyber threats
ransomware
phishing attack
ransomeware
malware
data theft
android malware
phishingattack
cybersecurity
cyberthreats
data protection
cyber security
credential theft
financial security
data stealing
cybercrime
phishing scam
cybersecurity threats
network security
ddos attack
trojan
cyber threat
financial fraud
phishing email
microsoft
lockbit
cybercriminals
net protector total security
cyber crime
ddos
cert-in
twitter
data security
critical vulnerability
india
cyber fraud
cyberattack
pakistan-backed hacker
malicious apps
email phishing
server security
clop
ransomware attacks
credit card theft
winrar
databreach