ClickFix Social Engineering is Becoming More Popular

Roger Grimes | Aug 5, 2025

blog.knowbe4.comhubfssocial-suggested-imagesblog.knowbe4.comhubfsSocial Image RepositoryEvangelist Blog Social GraphicsEvangelists-Roger Grimes-1.ClickFix attacks have been around for decades; only the name is new.

ClickFix attacks use social engineering to trick users into clicking on buttons and links that the user is told are needed so their browser or computer can perform some desired action.

The most common type of ClickFix attack example, and where the name itself comes from, is where a user intentionally searches for some sort of computer error they are having…say Windows error 1F0039a (I made that up), and the browser engine returns lots of links regarding that error. 

Unbeknownst to the user, the internet search engine results have been gamed (i.e., “poisoned”) so that a simple search for a solution returns a malicious website high up in the results. Usually, the attacker has either created a fake website with the error message embedded in the website over and over (but not visible to users), or they have paid the search engine vendor to have their website returned when that particular keyword is searched on. Either way, the attacker’s website link ends up high on the list of websites with solutions.

When the user goes to the malicious website, the scammer attempts to social engineer the user into performing an action that is against the user’s best interests. In most cases, it’s to click a button to fix something (hence, the “ClickFix” name). Sometimes the button click takes the user to another malicious website, sometimes it downloads a malicious document or content, and sometimes it brings up instructions that the user is supposed to copy and run on their computer. 

Decades ago, early versions of the latter type of ClickFix attack would have the user type in some short command, like ‘\del. /e/s/f/q && Y’ or something similar, which would delete a lot of important operating system files and make the user’s system quickly unusable. 

Today’s ClickFix attacks want control of the user’s system, not destruction. The commands they want the user to run are longer and more involved. Hence, they instruct the user to copy the command and execute it on the user’s desktop. If the user follows the instructions and executes the command, the attacker usually gains remote access to the victim’s computers.

It’s pretty dastardly. 

A very common ClickFix attack is where the user is taken to a malicious website and then purportedly shown a CAPTCHA dialog box that they must click on to “prove they are human.”

We’ve all seen those legitimate prompts. You click on them, and then you are validated and allowed onto the website. With ClickFix sites, you are then given some text to copy and run on your system. The instructions usually tell the user to type Ctrl-R (which opens the Run dialog box in Windows) followed by Ctrl-V, which copies the malicious code from the malicious website and pastes it into the now open Run prompt.

Although some of the ClickFix attacks are readily apparent, others are a little more sneaky. Here are some great ClickFix examples from a cyber advisory from the US Department of Health and Human Services (https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf)

Brian Krebs did a great article on this type of ClickFix example here.

The Cybersecurity and Infrastructure Security Agency (CISA) is warning of this exact type of attack again, this time as used by the Interlock ransomware gang. In the Interlock warning, CISA states, “This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.”

So, it’s being used more and more.

The examples I’ve talked about, along with Brian Krebs and CISA, are related to Microsoft Windows, but similar types of attacks can be accomplished on all computer operating systems with slight changes. 

ClickFix attacks can be difficult to stop because the commands being typed in are hard for endpoint detection and response software to detect and stop. 

You can try to disable the ability for users to get to command prompts, but it can be difficult because doing so often blocks a lot of legitimate processes (which use command prompts in the background to operate). 

You should educate your users about these types of attacks so that they know that copying text from a website and running it on their computer can be harmful.

A little education goes a long way.


Live Demo: Supercharge Your Anti-Phishing Defense with PhishER Plus

Email alone is the highest cause of data breaches and 56% of all attacks bypass your legacy security filters! The upshot? Legacy email security layers let these digital time bombs slip into the inboxes of your users. Introducing PhishER Plus - the most powerful anti-phishing protection available in the world.

PhishER-Plus

To learn how we can make such a claim, get a product demonstration of the new PhishER add-on, PhishER Plus. In this live one-on-one demo we will show you how you can:

  • Block email threats that have bypassed all other email security filters or systems before they reach your users’ mailboxes with the Global Blocklist
  • Isolate malicious emails that already bypassed your mail filters through automated quarantine with Global PhishRIP
  • Crowdsource threat intelligence from 10+ million KnowBe4 trained users
  • Save time and budget by reducing the volume of remediation efforts handled by your SOC Team
  • Leverage the power of triple-validated threat intelligence to protect your organization from new attacks

Request A Demo

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/products/phisher-plus-request-a-demo



Subscribe to Our Blog


Gartner Magic Quadrant




Get the latest insights, trends and security news. Subscribe to CyberheistNews.