A new wave of cyberattacks leveraging the “ClickFix” malware campaign is targeting unsuspecting users by replicating Cloudflare’s Turnstile verification screens, employing advanced social engineering tactics to bypass security controls and install malware with alarming stealth.
Analysts warn that this method exploits users’ conditioned trust in CAPTCHAs and browser-based security prompts, elevating ClickFix as a significant threat in the evolving landscape of phishing and malware delivery.
Sophisticated Social Engineering
ClickFix fundamentally operates by creating a highly convincing facsimile of Cloudflare’s human verification interface complete with official branding, realistic “Ray ID” tokens, and familiar messaging thus luring victims into a false sense of security.
Unlike traditional phishing, which often involves file downloads or obvious credential harvesting, ClickFix persuades users to execute malicious code themselves via clipboard manipulation and system-level scripting.
The attack sequence initiates when a victim encounters a seemingly authentic Cloudflare Turnstile page while browsing a compromised or malicious site.
The page prompts the user to click a “Verify you are human” checkbox, triggering the next stage of the operation.
Instead of a straightforward CAPTCHA, the user is guided through a set of “verification steps,” commonly instructing them to press Win+R to invoke the Windows Run dialog, followed by Ctrl+V and Enter unknowingly pasting and executing a malicious PowerShell command that has been covertly copied to the clipboard by embedded JavaScript.

This clipboard injection technique is handled entirely client-side using obfuscated web scripts within the attacker’s HTML file.
According to the SlashNext Report, the attack does not rely on external resources, allowing the fake verification page to load rapidly and function across multiple malicious or hijacked domains.
By auto-generating unique domain names and Ray ID numbers, each phishing instance appears bespoke, evading cursory detection and raising no immediate suspicion.

Clipboard Injection Bypasses Antivirus
The PowerShell payload, typically delivered in a single, obfuscated line, retrieves and executes secondary malware directly in memory frequently sidestepping traditional endpoint protection, which tends to focus on scanning for newly downloaded executables rather than direct command-line abuse.
In observed campaigns, ClickFix has facilitated the deployment of various threat families, including infostealers like Lumma and Stealc, as well as remote access trojans (RATs) such as NetSupport Manager, granting attackers persistent control over compromised systems.
What makes ClickFix particularly insidious is its reliance on user psychology. Modern internet users, accustomed to constant security checks and CAPTCHAs, tend to comply with verification routines presented in familiar formats, often without scrutinizing unfamiliar instructions.
The presence of official logos, realistic UI elements, and a secure browser padlock further contribute to the illusion of legitimacy.
Attackers also exploit trusted domains, sometimes by injecting ClickFix scripts into legitimate but vulnerable websites, thereby invalidating the common advice of “always check the URL.”
This blend of deceptive design, technical sophistication, and exploitation of user habits underscores the potency of ClickFix attacks.
Given the absence of explicit downloads and the use of trusted system utilities, detection remains challenging for traditional defenses.
Experts recommend heightened user awareness, regular security training, and adoption of advanced anti-phishing technologies that can recognize these emerging tactics.
AI-driven solutions, such as those offered by security vendors like SlashNext, are increasingly capable of detecting fake verification pages and clipboard abuses in real time, mitigating the risk before the malware can be unleashed.
As phishing and malware campaigns continue to evolve, the ClickFix method illustrates how attackers can circumvent security by reframing the attack as a routine safety measure and why user vigilance and advanced security posture are critical in combating these threats.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Update