Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor

ClickFix: The Hidden Security Threat

Image © Arstechnica
Security researchers warn of ClickFix, a rising threat that bypasses many endpoint protections by leveraging malvertising and a one-line command, affecting both Mac and Windows users.

Security researchers warn of ClickFix, a relatively new attack technique that can slip past many endpoint protections on both macOS and Windows machines. The approach relies on social engineering and rapid, automated downloads delivered from a compromised site to install credential-stealing software with little to no warning.

Campaigns often begin with emails that appear to come from a hotel with a pending reservation, or messages on popular apps like WhatsApp, or even top results in Google search. The lure is tailored to look trustworthy and to prompt the user to click a link and visit a malicious page.

On arrival, users are presented with a CAPTCHA or other pretext that asks them to copy a short string, open a terminal or shell, paste it in, and press Enter. That single line triggers the malware to reach a attacker-controlled server and pull down additional payloads.

The malware then installs itself covertly, causing infection without visible signs. The common result is credential-stealing software, though campaigns have delivered other payloads such as cryptocurrency wallets or software to turn a host into part of a botnet, and to modify macOS or Windows settings to persist across reboots.

Security researchers at CrowdStrike described a particularly polished ClickFix campaign that used a Mach-O binary (the standard macOS executable) to carry the main payload, underscoring how Gatekeeper bypasses can be exploited when the user performs that one-line command. They stressed that the technique remains popular because it promotes site traffic and directly installs malware with minimal user interaction.

Experts say malvertising combined with the one-line installation command is a persistent threat, and other campaigns have targeted Windows users with similar tactics. Defender products can help, but criminals often find ways around them, making awareness and cautious browsing essential defense.

As the holiday season approaches and families spend more time online, researchers urge people to scrutinize unexpected messages, even from trusted sources, and to avoid copying text into terminals or commands unless they are certain of the source.

 

Arstechnica

Notícias relacionadas

Divergência MME e Aneel sobre cessão de postes
Brisanet dobra base móvel em 2025
Vivo anuncia Rogério Takayanagi como VP de engenharia e serviços
GT fará minuta da Política Nacional de Infraestruturas Críticas
Oi: Justiça prorroga blindagem de pagamentos até abril
Rogerio Takahyanagi assume Vivo como VP Engenharia

O ISP.Tools sobrevive graças aos anúncios.

Considere desativar seu bloqueador de anúncios.
Prometemos não ser intrusivos.

Consentimento para cookies

Utilizamos cookies para melhorar a sua experiência no nosso site.

Ao utilizar o nosso site, você concorda com o uso de cookies. Saiba mais