A classy social engineering approach often known as ClickFix baiting has gained traction amongst cybercriminals, starting from particular person hackers to state-sponsored Superior Persistent Menace (APT) teams like Russia-linked APT28 and Iran-affiliated MuddyWater.
This technique targets human finish customers because the weakest hyperlink in cybersecurity defenses, tricking them into executing malicious instructions via seemingly benign prompts.
A Stealthy Social Engineering Menace Emerges
ClickFix campaigns have impacted numerous industries, together with healthcare, hospitality, automotive, and authorities sectors, posing a big risk to organizational safety worldwide.
By leveraging acquainted platforms like GitHub or misleading phishing emails, attackers ship payloads that provoke a series of malicious actions, usually bypassing conventional safety measures with alarming ease.
Investigations by Darktrace’s Menace Analysis staff, carried out in early 2025, have make clear the intricate assault chain of ClickFix campaigns.

Attackers sometimes achieve preliminary entry via spear phishing hyperlinks, drive-by compromises, or faux CAPTCHA prompts that redirect customers to malicious URLs disguised as routine verification steps or error fixes.
As soon as misled, victims are guided via a misleading three-step course of opening a Home windows Run dialog field, pasting a malicious PowerShell command, and executing it ensuing within the set up of malware households like XWorm, Lumma, and AsyncRAT.
Darktrace’s anomaly-based detection recognized these threats throughout buyer environments in Europe, the Center East, Africa, and america.
ClickFix Assault Lifecycle
In a particular incident on April 9, 2025, Darktrace / NETWORK flagged a brand new PowerShell person agent on a compromised gadget, indicating distant code execution and subsequent command-and-control (C2) communication with suspicious endpoints.

This was adopted by the obtain of numerically named recordsdata usually a trademark of malware used for lateral motion and knowledge exfiltration to IPs like 193.36.38[.]237, confirmed as malicious by a number of OSINT sources.
In accordance with the Report, The assault culminated in automated knowledge egress to a secondary C2 server, 188.34.195[.]44, highlighting the pace and stealth of ClickFix operations.
When configured in Autonomous Response mode, Darktrace efficiently blocked connections to malicious endpoints inside seconds, demonstrating the ability of real-time risk containment.
With out such automation, guide intervention usually fails to maintain tempo with the fast development of those assaults, permitting delicate knowledge to be stolen or additional community compromise to happen.
Darktrace’s skill to correlate indicators of compromise (IoCs) and set off high-priority alerts via its Enhanced Monitoring mannequin underscores the necessity for adaptive, anomaly-driven cybersecurity options in combating evolving techniques like ClickFix that exploit human error with precision.
Indicators of Compromise (IoCs)
Kind | IoC Worth | Description + Confidence |
---|---|---|
IP Deal with | 193.36.38[.]237 | C2 Server – Confirmed Malicious |
IP Deal with | 188.34.195[.]44 | C2 Server – Confirmed Malicious |
IP Deal with | 138.199.156[.]22 | C2 Server – Confirmed Malicious |
Hostname | rkuagqnmnypetvf[.]high | C2 Server – Confirmed Malicious |
URI | /1744205184 | Potential Malicious File |
SHA-256 Hash | 34ff2f72c191434ce5f20ebc1a7e823794ac69bba9df70721829d66e7196b044 | Potential Malicious File |
To Improve Your Cybersecurity Expertise, Take Diamond Membership With 150+ Sensible Cybersecurity Programs On-line – Enroll Right here