Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Critical Open VSX -no -register exposes millions of developers for supply chain attacks

June 26, 2025

The new FileFix method is a threat

June 26, 2025

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » The new FileFix method is a threat
Global Security

The new FileFix method is a threat

AdminBy AdminJune 26, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


June 26, 2025Red LakshmananCyber ​​-uataka / Analysis of malicious programs

Social Engineering tactics Clickfix as the initial access vector using fake CAPTCHA checks increased by 517% between the second half of 2024 and the first half of this year, according to ESET.

“The list of threats to which clickfix attacks are growing, increasing every day, including infastel, ransom, remote trojans, kryptomas, after operating tools and even custom from national institutions brought up in the country,” rust, laboratory director – Note.

Clickfix has become a widely popular and the deceptive method The error uses or check -up CAPTCHA checks to fool the victims to copy and insert a malicious scenario either in the Windows dialog or into the Apple MacOS terminal app, and run it.

The Slovak cybersecurity company said the highest detection of ClickFix is ​​concentrated around Japan, Peru, Poland, Spain and Slovakia.

The prevalence and efficiency of this attack led to the threat of subjects advertising Eset was added by builders who provide other assaults from clicks that change in the queue, added ESET.

From Clickfix to FileFix

Development comes as a safety researcher MRD0X demonstrated An alternative to the Clickfix called FileFix, which liners users who submit a copy and insert the file way in Windows File Explorer.

The technique, essentially, involves the achievement of the same as ClickFix, but in another way, combining the ability of File Explorer to perform operating system commands through the targeted web -browser file download feature.

Cybersecurity

In the attack scenario developed by the researcher, the threat actor can develop a phishing page that instead of reflecting the counterfeit CAPTCHA to the future goal, presents a message stating that the document was divided with them and that they need to copy and insert the file on the target panel by clicking Ctrl + L.

The phishing page also includes the outstanding “Open File Explorer”, which, by clicking, opens File Explorer and copies the malicious PowerShell team to the user exchange buffer. So, when the victim cut the “file path”, a team of the attacker is instead.

This, in turn, is achieved by changing the copied file way to prepare the PowerShell command before it follows from adding spaces to hide it from viewing and a pound (“#”) to view the fake file as a comment: “PowerShell.exe -c Ping Example.com# C: \\\\ Desoy.doc“

“In addition, our PowerShell team will unite the dummy’s way after commenting to hide the command and show the file path,” MRD0X said.

Physhing Company in an area

Spla the in Clickfix companies also coincides with the opening of various phishing companies that –

  • Use the .gov domain to Send Phisching -Leads This masquerade as an unpaid fee for taking users on fictitious pages designed to collect their personal and financial information
  • Use durable domains (LLDS), a technique called Aging strategic domainby Either the host or use them to redirect users To order CAPTCHA Check Pages, completing what they lead to fake Microsoft command pages to steal their Microsoft account account data
  • Allocate Files Harmful Windows (LNK) In the ZIP archives for launching the PowerShell code responsible for the deployment of rats Remcos
  • Use baits that are supposedly warn users that their mailbox is almost full and what they need to “cleanse the storage” by pressing the button built into the message Ipfs This steals users by email. Interestingly, the emails also include the RAR archive, which, as soon as it is extracted, reset the XWORM malicious software.
  • Turn on URL that allows PDF -documentWhich, in turn, contains another URL that submits the ZIP archive that includes the executable file responsible for launching the Lumma Autonic Software
  • Weapon legitimate front platform called Vercel place dummy sites that distribute the malicious version of Logmein to get full control over the victim
  • Expose yourself to state departments US vehicles (DMV) Submit SMS -Messages of Unefined Board Violations and redirect the recipients to deceptive places that harvest personal information and credit card data
  • Use emails with SharePoint theme Redirect users to page credentials Located on domains “*.

“E -mails containing SharePoint links are less likely as malicious either EDR or antiviral software software. Users also have less suspicious, suggesting that Microsoft links are essentially safer,” CyberProuof said.

“Since the Phishing Page is located on SharePoint, they are often dynamic and available only through a certain link for a limited time, making them more complicated for automated scanners, scanners and sandboxes.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Critical Open VSX -no -register exposes millions of developers for supply chain attacks

June 26, 2025

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025

Why is built -in protection insufficient for modern data sustainability

June 26, 2025

Iranian APT35 hackers are oriented

June 26, 2025

Cyber-Cyber ​​Use open source tools to compromise financial institutions across Africa

June 26, 2025

CISA adds 3 flaws to KEV directory, affecting AMI Megarac, D-Link, Fortinet

June 26, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Critical Open VSX -no -register exposes millions of developers for supply chain attacks

June 26, 2025

The new FileFix method is a threat

June 26, 2025

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025

Why is built -in protection insufficient for modern data sustainability

June 26, 2025

Iranian APT35 hackers are oriented

June 26, 2025

Cyber-Cyber ​​Use open source tools to compromise financial institutions across Africa

June 26, 2025

CISA adds 3 flaws to KEV directory, affecting AMI Megarac, D-Link, Fortinet

June 26, 2025

WhatsApp adds resumes that run on AI, for faster preview chat

June 26, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Critical Open VSX -no -register exposes millions of developers for supply chain attacks

June 26, 2025

The new FileFix method is a threat

June 26, 2025

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.