ClickFix Attacks Surge 517% in 2025, Fake CAPTCHAs Spread Malware

ClickFix and FileFix Phishing Attacks Surge: 517% Rise in Fake CAPTCHA and File Explorer Techniques Targeting Global Users

  • ClickFix attacks using fake CAPTCHA verifications have risen by 517% in early 2025, according to ESET.
  • The ClickFix technique leads to a range of threats, including info-stealing Malware, Ransomware, and custom nation-state malware.
  • Attack volumes are highest in Japan, Peru, Poland, Spain, and Slovakia.
  • A new method called FileFix uses Windows File Explorer to trick users into executing malicious code from their clipboard.
  • Recent phishing campaigns use multiple methods, including fake .gov domains and SharePoint links, to steal credentials and personal information.

Cybersecurity researchers from ESET have reported a substantial increase in cyberattacks using the ClickFix scheme, which uses deceptive CAPTCHA checks to gain initial system access. The attack method, which spreads via fake error messages, tricks victims into copying and running harmful commands, mainly targeting systems in Japan, Peru, Poland, Spain, and Slovakia.

- Advertisement -

Recent data shows a 517% increase in ClickFix incidents between late 2024 and early 2025. Attackers use ClickFix tactics to deliver various cyber threats, including infostealers, ransomware, and sophisticated malware. “The list of threats that ClickFix attacks lead to is growing by the day, including infostealers, ransomware, remote access trojans, cryptominers, post-exploitation tools, and even custom malware from nation-state-aligned threat actors,” said Jiří Kropáč, Director of Threat Prevention Labs at ESET.

The ClickFix mechanic works by displaying convincing CAPTCHA or error prompts, which ask users to copy scripts into the Windows Run dialog or macOS Terminal. These scripts then execute malicious code on the victim’s device. ESET noted that attackers are now selling tools that allow others to create their own ClickFix-based phishing pages, spreading the method further.

Security researcher mrd0x recently demonstrated a similar attack technique called FileFix. Instead of a CAPTCHA prompt, FileFix asks users to copy and paste a file path into Windows File Explorer. The clipboard contents actually contain a hidden PowerShell command that runs when pasted, giving attackers another method to execute code remotely. The FileFix approach combines Windows’ ability to execute code from the File Explorer address bar with social engineering tactics.

Alongside these developments, security teams have discovered new phishing campaigns that exploit trusted services and platforms. Some use fake .gov domains to lure victims, while others use aging web domains or distribute malicious ZIP files containing shortcut files that activate remote access tools like Remcos RAT.

- Advertisement -

Attackers have also used SharePoint-themed emails to send users to phishing pages hosted on genuine SharePoint domains, making detection more difficult. Experts note that these phishing links are hard to spot and widely trusted by users, which increases their effectiveness.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Silver Surges Amid Growing Retail Interest, Eyes $100 per Ounce Mark

Precious metals such as silver are experiencing notable price movement, drawing increased attention from...

BOS Unveils Grail Pro to Activate Dormant Institutional Bitcoin

BOS has launched Grail Pro, a protocol for turning unused institutional Bitcoin into working...

Goldman Sachs Slashes Copper Supply Forecasts After Grasberg Halt

Goldman Sachs lowered its global copper supply forecast after an accident at Indonesia’s Grasberg...

Justin Sun Clashes With World Liberty Over WLFI Token Blacklisting

Justin Sun, advisor and major investor in World Liberty Financial, had a significant number...

Sophisticated Phishing Scam Bypasses 2FA on Crypto X Accounts

New phishing campaign targets X accounts of crypto figures using advanced methods. Attack bypasses two-factor...
- Advertisement -

Must Read

17 Best Cryptocurrency Wallets

If you are looking for a list with the best cryptocurrency wallets, then you've landed on the right page. Cryptocurrency, as we all know,...