{"id":53348,"date":"2025-04-29T17:16:39","date_gmt":"2025-04-29T21:16:39","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=53348"},"modified":"2025-04-29T17:16:39","modified_gmt":"2025-04-29T21:16:39","slug":"what-is-clickfix","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/what-is-clickfix\/53348\/","title":{"rendered":"ClickFix technique: what it is and why it&#8217;s dangerous"},"content":{"rendered":"<p>Attackers are increasingly using the ClickFix technique to infect Windows computers to force users to run malicious scripts manually. The use of this tactic was first seen in the spring of 2024. Since then, attackers have come up with a number of scenarios for its use.<\/p>\n<h2>What is ClickFix?<\/h2>\n<p>The ClickFix technique is essentially an attempt to execute a malicious command on the victim\u2019s computer relying solely on social engineering techniques. Under one pretext or another, attackers convince the user to copy a long command line (in the vast majority of cases \u2014 a PowerShell script), paste it into the system\u2019s Run window, and press Enter, which should ultimately lead to compromising the system.<\/p>\n<p>The attack normally begins with a pop-up window simulating a notification about a technical problem. To fix this problem, the user needs to perform a few simple steps, which boil down to copying some object and executing it through the Run application. However, in Windows 11, PowerShell can also be executed from the search bar for applications, settings, and documents, which opens when you click on the icon with the system\u2019s logo, so sometimes the victim is asked to copy something there.<\/p>\n<div id=\"attachment_53349\" style=\"width: 785px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/04\/29155621\/what-is-clickfix-copyfix.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53349\" class=\"wp-image-53349 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/04\/29155621\/what-is-clickfix-copyfix.png\" alt=\"ClickFix: instructions for self-infection\" width=\"775\" height=\"652\"><\/a><p id=\"caption-attachment-53349\" class=\"wp-caption-text\">ClickFix attack \u2013 how to infect your own computer with malware in three easy steps. <a href=\"https:\/\/securelist.com\/fake-captcha-delivers-lumma-amadey\/114312\/\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p><\/div>\n<p>This technique earned itself the name ClickFix because usually the notification contains a button, the name of which is somehow related to the verb \u201cto fix\u201d (Fix, How to fix, Fix it\u2026), which the user needs to click to solve the alleged problem or see instructions for solving it. However, this isn\u2019t a mandatory element \u2014 the need to launch some code can be justified by the requirement to check the computer\u2019s security, or, for example, to confirm that the user is not a robot. In this case, the Fix button can be omitted.<\/p>\n<div id=\"attachment_53350\" style=\"width: 265px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/04\/29160007\/what-is-clickfix-verify.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53350\" class=\"size-full wp-image-53350\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/04\/29160007\/what-is-clickfix-verify.png\" alt=\"ClickFix: instructions for a fake captcha\" width=\"255\" height=\"156\"><\/a><p id=\"caption-attachment-53350\" class=\"wp-caption-text\">An example of instructions for confirming that you\u2019re not a robot. <a href=\"https:\/\/securelist.com\/fake-captcha-delivers-lumma-amadey\/114312\/\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p><\/div>\n<p>The scheme may differ slightly from case to case, but attackers typically give the victim the following instructions:<\/p>\n<ul>\n<li>click the button to copy the code that solves the problem;<\/li>\n<li>press the key combination [Win] + [R];<\/li>\n<li>press the combination [Ctrl] + [V];<\/li>\n<li>press [Enter].<\/li>\n<\/ul>\n<p>So what actually happens? The first action (clicking the button to copy the code that solves the problem) copies some script invisible to the user to the clipboard. The second (pressing the key combination [Win] + [R]) opens the Run window, which in Windows is designed to quickly launch programs, open files and folders, and enter commands. In the third (pressing the combination [Ctrl] + [V]), the PowerShell script is pasted into Run window from the clipboard. And finally, with the fourth action (pressing [Enter]), the code is launched with the current user privileges.<\/p>\n<p>As a result of executing the script, malware is downloaded and installed onto the computer \u2014 with the specific malicious payload varying from campaign to campaign. Thus, what we get is the user running a malicious script on their own system thereby infecting his own computer.<\/p>\n<h2>Typical attacks using the ClickFix technique<\/h2>\n<p>Sometimes attackers create their own websites and lure users to them using various tricks. Or they hack existing websites and force them to display a pop-up window with instructions. In other cases similar instructions are delivered under various pretexts via email, social networks, or even through instant-messengers. Here are some typical scenarios of using this technique in attacks:<\/p>\n<h3>1. Unable to display the page, need to refresh the browser<\/h3>\n<p>A classic scenario in which the visitor doesn\u2019t see the page they expected to and is told they need to install a browser update to display it.<\/p>\n<h3>2. Error loading a document on a website<\/h3>\n<p>Another standard tactic: the user isn\u2019t allowed to view a certain document in Microsoft Word or PDF format. Instead, they\u2019re shown a notification asking to install a plugin for viewing the PDF or \u201cWord online\u201d.<\/p>\n<h3>3. Error opening a document from email<\/h3>\n<p>In this case attackers substitute the file format. The victim sees a .pdf or .docx icon, but in reality clicks on the HTML file that opens in the browser. Then everything is similar to the previous case \u2014 what are needed are: a plugin, malicious instructions, and the familiar \u201cHow to fix\u201d button.<\/p>\n<h3>4. Problems with the microphone and camera in Google Meet or Zoom<\/h3>\n<p>A more unusual variation of the ClickFix tactic is used on fake Google Meet or Zoom websites. The user receives a link for a video call, but \u201cis not allowed to join\u201d it, because there are problems with their microphone and camera. The message \u201cexplains\u201d how to fix it.<\/p>\n<h3>5. Prove that you\u2019re not a robot \u2013 fake CAPTCHA<\/h3>\n<p>Finally, the most curious version of the attack using ClickFix: the site visitor is asked to complete a fake CAPTCHA to prove they\u2019re not a robot. But the required proof is, of course, is to follow the instructions written in the pop-up window.<\/p>\n<div id=\"attachment_53351\" style=\"width: 957px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/04\/29160217\/what-is-clickfix-CAPTCHA.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53351\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/04\/29160217\/what-is-clickfix-CAPTCHA.png\" alt=\"ClickFix web attack: fake CAPTCHA\" width=\"947\" height=\"545\" class=\"size-full wp-image-53351\"><\/a><p id=\"caption-attachment-53351\" class=\"wp-caption-text\">Prove you\u2019re not a robot \u2013 to do this, run a malicious script on your computer. <a href=\"https:\/\/securelist.com\/lumma-fake-captcha-attacks-analysis\/116274\/\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p><\/div>\n<h3>How to protect yourself from ClickFix attacks?<\/h3>\n<p>The simplest mechanism for protecting your company from attacks using the ClickFix technique involves blocking the [Win] + [R] key combination in the system \u2014 it\u2019s hardly needed at all in the day-to-day work of the typical employee. However, this isn\u2019t a panacea \u2014 as we already wrote above, in Windows 11 the script can be launched from the search bar, and some variations of this attack use more detailed instructions in which the user is told how to manually open the Run window.<\/p>\n<p>Therefore, protective measures, of course, should be comprehensive and primarily aimed at training employees. It\u2019s worth conveying to them that if someone seeks any manual manipulations with the system \u2014 it\u2019s an extremely alarming sign.<\/p>\n<p>Here are some tips on how to protect your organization\u2019s employees from attacks using ClickFix tactics:<\/p>\n<ul>\n<li>Be sure to use <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">a reliable security solution<\/a> on all corporate devices, and also install <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-server?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksms___\" target=\"_blank\" rel=\"noopener nofollow\">protection at the mail gateway level<\/a>.<\/li>\n<li>Raise employee awareness of cyberthreats, including new tactics, with specialized training. Organizing such training is easy \u2013 just use our automated educational <a href=\"https:\/\/k-asap.com\/en\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform <\/a>.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>An infection tactic called ClickFix is becoming increasingly popular among cybercriminals. We explain how such attacks work and how to protect your company against it.<\/p>\n","protected":false},"author":2484,"featured_media":53353,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051,3052,2683],"tags":[513],"class_list":{"0":"post-53348","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"category-threats","11":"tag-social-engineering"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what-is-clickfix\/53348\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what-is-clickfix\/28798\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what-is-clickfix\/24030\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what-is-clickfix\/28910\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/what-is-clickfix\/39442\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/what-is-clickfix\/29073\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/what-is-clickfix\/34852\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what-is-clickfix\/34485\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/social-engineering\/","name":"social engineering"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=53348"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53348\/revisions"}],"predecessor-version":[{"id":53352,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53348\/revisions\/53352"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/53353"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=53348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=53348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=53348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}