Hackers Exploit ClickFix Tactic to Gain Full Control Over Windows Machines

A new phishing campaign is targeting Windows users with a deceptive technique called ClickFix, tricking victims into executing malicious PowerShell commands. The attack, active since March 2025, deploys a modified version of the Havoc command-and-control (C2) framework through SharePoint abuse, allowing attackers to take full control of compromised systems.
- Hackers send phishing emails disguised as urgent document notifications. Victims are instructed to copy and paste a PowerShell command to fix a fake error message.
- The PowerShell script retrieves a malicious payload from a SharePoint link controlled by attackers, bypassing traditional security measures.
- The malware checks for sandbox environments, establishes persistence, and downloads a Python interpreter if necessary. It then loads a hidden malicious DLL without leaving traces on disk.
- The final payload is a modified Havoc post-exploitation tool, which masks its traffic using Microsoft Graph API to blend with legitimate cloud service activity.
- The malware uses AES-256 encryption and SharePoint API calls to send stolen data and receive attacker commands, erasing traces immediately after execution.
- Fortinet has issued security signatures to block the attack chain and advises organizations to train employees, monitor SharePoint activity, and restrict PowerShell execution to prevent exploitation
This attack highlights the growing sophistication of phishing campaigns that combine social engineering, open-source malware, and cloud abuse to evade detection. Organizations must stay vigilant, monitor cloud API usage, and implement strict PowerShell execution policies to defend against such threats.
Stay Secure with Net Protector Cyber Security!
Comment(s)
Categories
- Other (42)
- Ransomware (142)
- Events and News (27)
- Features (45)
- Security (466)
- Tips (79)
- Google (23)
- Achievements (11)
- Products (34)
- Activation (7)
- Dealers (1)
- Bank Phishing (44)
- Malware Alerts (212)
- Cyber Attack (260)
- Data Backup (11)
- Data Breach (98)
- Phishing (156)
- Securty Tips (1)
- Browser Hijack (18)
- Adware (15)
- Email And Password (69)
- Android Security (71)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (8)
- vulnerability (56)
- Hacker (31)
- Spyware (9)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (5)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (7)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (11)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (5)
- Amazon (2)
- DMart (1)
- Payment Risk (4)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (10)
- Impersonation phishing (1)
- DDoS (5)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)
Recent Posts
Archive
Tags
cyber attack
phishing
data breach
phishing attacks
cyber threats
ransomware
phishing attack
ransomeware
malware
android malware
cyberthreats
cyber security
phishingattack
data theft
financial security
cybercrime
ddos attack
network security
phishing scam
data stealing
ddos
twitter
india
cyber crime
data security
cyber threat
financial fraud
phishing email
microsoft
critical vulnerability
data protection
lockbit
net protector total security
cyber fraud
cybercriminals
trojan
cert-in
scam
windows security
androidmalware
cyber attacks
cybersecurity
microsoft team
malware attack
vulnerability
cyberattack
rat malware
data backup
vb100 certification
organisation