Threat Advisory

ClickFix Attack Replaces PowerShell With Cmdkey and Remote Regsvr32 Payload Delivery

Threat: Malware Campaign
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: High
[subscribe_to_unlock_form]

EXECUTIVE SUMMARY:

Social engineers have been orchestrating a campaign that targets various sectors, particularly in the Asia-Pacific region, with a focus on compromising user credentials and establishing a persistent backdoor on compromised systems. The attackers' primary objective is to exfiltrate sensitive data, which they can then use for financial gain or to disrupt operations. This threat is highly significant, as it leverages trusted Windows utilities, making it challenging to detect and mitigate.[/subscribe_to_unlock_form]

EXECUTIVE SUMMARY:

Social engineers have been orchestrating a campaign that targets various sectors, particularly in the Asia-Pacific region, with a focus on compromising user credentials and establishing a persistent backdoor on compromised systems. The attackers' primary objective is to exfiltrate sensitive data, which they can then use for financial gain or to disrupt operations. This threat is highly significant, as it leverages trusted Windows utilities, making it challenging to detect and mitigate.[emaillocker id="1283"]

The malware's infection vector is initiated when an unsuspecting user executes a malicious command via the Windows Run dialog, which is socially engineered to appear as a CAPTCHA challenge. This single action triggers a multi-stage execution chain that relies on trusted Windows components, avoiding obvious malware drops. The attacker's goal is to stage credentials, retrieve a remote DLL, and execute it silently, maintaining execution reliability while achieving a high degree of stealth.

This threat is particularly challenging to defend against due to its reliance on native Windows utilities and user-initiated behavior. Organisations must remain vigilant and take proactive measures to prevent such attacks. This includes ensuring that all systems are patched and up-to-date, closely monitoring cmdkey usage and task scheduler activity, restricting or closely monitoring outbound SMB/UNC access, and continuing user education on social engineering tactics. Furthermore, implementing robust endpoint protection and maintaining regular backups can help organisations quickly recover from potential data breaches.

THREAT PROFILE:

Tactic Technique ID Technique Sub-technique
Initial Access T1566 Phishing
Initial Access T1195 Supply Chain Compromise
Execution T1204 User Execution
Execution T1059 Command and Scripting Interpreter
Defense Evasion T1027 Obfuscated Files or Information
Defense Evasion T1036 Masquerading
Defense Evasion T1564.003 Hide Artifacts Hidden Window
Command and Control T1071 Application Layer Protocol
Command and Control T1105 Ingress Tool Transfer
Collection T1005 Data from Local System
Exfiltration T1041 Exfiltration Over C2 Channel

MBC MAPPING:

Objective Behaviour ID Behaviour
Execution E1204 User Execution
Persistence F0012 Scheduled Task
Command and Control B0030 C2 Communication
Defense Evasion F0004 Disable or Evade Security Tools

REFERENCES:

The following reports contain further technical details:

https://cybersecuritynews.com/clickfix-attack-replaces-powershell-with-cmdkey/
https://www.cyberproof.com/blog/beyond-powershell-analyzing-the-multi-action-clickfix-variant/

[/emaillocker]
crossmenu