New 'CrashFix' Variant Deploys Python RATs
Microsoft Security reports a new specific variant called 'CrashFix' that tricks users into installing a Python-based Remote Access Trojan.
Stay informed about the latest campaigns and variations of the ClickFix scam observed in the wild.
Microsoft Security reports a new specific variant called 'CrashFix' that tricks users into installing a Python-based Remote Access Trojan.
Push Security details 'ConsentFix', a variant targeting Microsoft 365 OAuth flows to bypass MFA without stealing passwords.
Push Security analyzes highly sophisticated ClickFix lures including fake Google Meet pages that look identical to the real thing.
Microsoft Threat Intelligence analyzes the rapid flooding of the threat landscape with ClickFix social engineering techniques.
Proofpoint's specific report 'The Human Factor 2025 Vol. 2' highlights a 400% increase in malicious links associated with ClickFix.
Check Point Research uncovers 'FileFix', a social engineering attack building on ClickFix that exploits the Windows File Explorer address bar.
ESET's H1 2025 Threat Report details a massive increase in ClickFix detections, identifying it as a top tier threat vector.
Attackers are using fake verification pages to trick users into running PowerShell commands that install the Lumma Stealer infostealer.
Proofpoint Security Brief on how the ClickFix social engineering technique is dominating the threat landscape.
The U.S. Health and Human Services issues a sector alert regarding the rising threat of ClickFix attacks against healthcare organizations.
Microsoft detects Storm-1811 using 'vishing' and Quick Assist tool abuse to deploy Black Basta ransomware—a key precursor to modern ClickFix tactics.