Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor

ClickFix: The Hidden Security Threat

Image © Arstechnica
Security researchers warn of ClickFix, a rising threat that bypasses many endpoint protections by leveraging malvertising and a one-line command, affecting both Mac and Windows users.

Security researchers warn of ClickFix, a relatively new attack technique that can slip past many endpoint protections on both macOS and Windows machines. The approach relies on social engineering and rapid, automated downloads delivered from a compromised site to install credential-stealing software with little to no warning.

Campaigns often begin with emails that appear to come from a hotel with a pending reservation, or messages on popular apps like WhatsApp, or even top results in Google search. The lure is tailored to look trustworthy and to prompt the user to click a link and visit a malicious page.

On arrival, users are presented with a CAPTCHA or other pretext that asks them to copy a short string, open a terminal or shell, paste it in, and press Enter. That single line triggers the malware to reach a attacker-controlled server and pull down additional payloads.

The malware then installs itself covertly, causing infection without visible signs. The common result is credential-stealing software, though campaigns have delivered other payloads such as cryptocurrency wallets or software to turn a host into part of a botnet, and to modify macOS or Windows settings to persist across reboots.

Security researchers at CrowdStrike described a particularly polished ClickFix campaign that used a Mach-O binary (the standard macOS executable) to carry the main payload, underscoring how Gatekeeper bypasses can be exploited when the user performs that one-line command. They stressed that the technique remains popular because it promotes site traffic and directly installs malware with minimal user interaction.

Experts say malvertising combined with the one-line installation command is a persistent threat, and other campaigns have targeted Windows users with similar tactics. Defender products can help, but criminals often find ways around them, making awareness and cautious browsing essential defense.

As the holiday season approaches and families spend more time online, researchers urge people to scrutinize unexpected messages, even from trusted sources, and to avoid copying text into terminals or commands unless they are certain of the source.

 

Arstechnica

Notícias relacionadas

Leilão de 700 MHz adiado para 2026
Claude Opus 4.5 impulsiona IA 2025
Novo Marco da Cibersegurança no Brasil
Brasil sobe para 16º lugar no ranking de IA 2025
Segurança da Informação em TI: Vazamentos em Ascensão
Ceará mira data centers no interior

O ISP.Tools sobrevive graças aos anúncios.

Considere a possibilidade de desativar seu bloqueador de anúncios.
Prometemos não ser intrusivos.

Consentimento de cookies

Usamos cookies para melhorar sua experiência em nosso site.

Ao usar nosso site, você concorda com os cookies. Saiba mais sobre o site