Phishing Kit Automates ClickFix Attack and Evades Security Measures

Cybercriminals are rapidly lowering the skill barrier for executing advanced social engineering attacks by proliferating phishing kits built around the ClickFix technique.

Researchers from Palo Alto Networks’ Unit 42 have discovered a web-based tool named IUAM ClickFix Generator that automates the creation of deceptive phishing pages, enabling even low-skilled attackers to craft convincing lures that manipulate victims into executing malicious commands manually.

IUAM ClickFix Generator Mimics Legitimate Browser Challenges

The IUAM ClickFix Generator, hosted on the IP address 38.242.212[.]5 and active since July 2025, is a publicly exposed phishing kit builder running on Express and styled with Tailwind CSS.

It allows threat actors to customize phishing pages that mimic legitimate “browser verification” challenges commonly used by CDN and cloud security providers. Through a simple web interface, attackers can configure titles, on-screen prompts, and footer messages.

User interface for the IUAM ClickFix Generator phishing kit.

More dangerously, it includes a clipboard injection feature that automatically copies malicious commands, often PowerShell or bash scripts, into the victim’s clipboard when they click verification buttons.

Attackers can also configure OS detection scripts to tailor payload delivery for Windows or macOS, using either PowerShell or Base64-encoded bash commands.

These customizations enable phishing pages to appear more authentic while simultaneously instructing unsuspecting users to execute commands that download and install information-stealing malware or remote access Trojans (RATs).

Advanced settings within the kit enable JavaScript obfuscation and mobile blocking, ensuring the page prompts desktop execution only.

Real-World Campaigns Deliver DeerStealer and Odyssey Malware

Researchers observed at least two confirmed campaigns leveraging kit-built ClickFix pages. In one case, attackers distributed DeerStealer, a Windows-only infostealer delivered through a clipboard-based PowerShell command.

Clicking the fake CAPTCHA injected a script that downloaded a malicious batch file (SHA256: 2b74674587a65cfc9c2c47865ca8128b4f7e47142bd4f53ed6f3cb5cf37f7a6b), which fetched an MSI file (SHA256: ead6b1f0add059261ac56e9453131184bc0ae2869f983b6a41a1abb167edf151) to install the malware.

 Campaign 1 – ClickFix page delivering DeerStealer.

A broader campaign targeted both Windows and macOS users to deliver the Odyssey infostealer, a malware-as-a-service (MaaS) tool distributed via multiple spoofed trading and cloud domains such as tradingview. connect-app[.]us[.]com and cloudlare-lndex[.]com.

The phishing logic parses the navigator.userAgent to detect platforms, dynamically injecting the relevant command for execution. Interestingly, these variants contained developer comments in Russian, indicating a shared codebase and likely Eastern European origin.

The discovery of the IUAM ClickFix Generator highlights how phishing-as-a-service ecosystems are evolving into comprehensive malware delivery pipelines, automating every step from lure design to payload execution.

Palo Alto Networks’ Advanced URL Filtering, DNS Security, and Cortex XDR modules have been updated to block associated indicators and effectively detect these cross-platform threats.

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

Priya
Priya
Priya is a Security Reporter who tracks malware campaigns, exploit kits, and ransomware operations. Her reporting highlights technical indicators and attack patterns that matter to defenders

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here