New ClickFix Scam Uses Windows Commands to Deploy Malware

New ClickFix Scam Uses Windows Commands to Deploy Malware

The deceptive simplicity of social engineering has reached a dangerous new plateau as cybercriminals exploit the inherent trust users place in their own operating system administrative shortcuts. This sophisticated iteration of the ClickFix campaign departs from traditional file-based infections by manipulating victims into executing remote commands directly through the Windows Run dialog box. By presenting a seemingly harmless technical hurdle, such as a malfunctioning verification widget, attackers persuade individuals to perform a specific sequence of keystrokes that effectively bypasses the standard security warnings associated with browser-based downloads. This method relies heavily on the user’s desire to resolve a perceived technical error quickly, illustrating a shift toward interactive exploitation where the human element serves as the primary gateway for initial system compromise in 2026. The psychological manipulation is so effective because it mirrors legitimate troubleshooting steps often recommended by IT support professionals, making the malicious request appear as a credible fix for a stalled web page or a failed CAPTCHA.

1. Mechanism of Deception: The Fake Captcha Hook

The entry point for this campaign involves a network of compromised or fraudulent websites, such as those registered under obscure top-level domains, which display a fraudulent verification interface. When a visitor encounters these pages, they are informed that a browser error has occurred and are instructed to resolve it by pressing a sequence of keys: Windows + R, followed by Ctrl + V and Enter. This sequence is critical because the malicious website has already utilized a background script to silently copy a complex PowerShell command or a network mapping instruction to the user’s system clipboard. Because the Windows Run dialog is a core component of the operating system, many users do not perceive it as a threat, unknowingly granting the attacker the ability to execute code outside the restricted environment of the web browser. This technique effectively neutralizes the effectiveness of secure browsing features that would typically flag a direct executable download or an unsigned script file.

Building upon this initial interaction, the executed command typically utilizes the native Windows utility known as net use to establish a connection with a remote, hacker-controlled server. To the underlying operating system, this activity appears identical to a standard business operation, such as mapping a shared drive within a corporate local area network. Once this virtual bridge is established, the workstation automatically retrieves a legitimate, digitally signed application to serve as a host for the payload. In recent observations, the attackers have utilized specific versions of the WorkFlowy productivity application, originally developed by FunRoutine Inc., to maintain a facade of normalcy. By leveraging a trusted piece of software that carries a valid digital signature, the threat actors ensure that the initial execution of the program is unlikely to trigger an alert from behavior-based security scanners. This strategic selection of software allows the malicious process to hide in plain sight among other active productivity tools.

2. Advanced Persistence: Leveraging Trusted Applications

The true innovation of this ClickFix variant lies in its use of an asar archive modification, frequently referred to by researchers as a brain-swap attack. While the WorkFlowy application itself is a genuine tool, the attackers replace a critical internal component—the asar file containing the application’s core logic—with a modified version that includes malicious JavaScript code. Because this file is loaded and executed by the legitimate Node.js process of the parent application, it inherits the full permissions of the logged-in user and operates within a trusted memory space. This bypasses the typical sandboxing mechanisms that prevent unauthorized applications from accessing sensitive system files or monitoring user activity. Since the primary executable remains unchanged and its signature remains intact, the malicious logic is successfully shielded from static file analysis tools. This allows the malware to maintain a persistent presence on the machine without ever writing a traditional virus file to the permanent storage drive.

Once the compromised application is active, it initiates a stealthy communication cycle with a command-and-control server, often utilizing domains that mimic legitimate infrastructure services like cloudflare.report. The malware generates a unique identifier for the victim, which is stored in a simple text file on the system to ensure the attacker can track the specific workstation across different sessions. Data is transmitted back to the server at regular two-second intervals, providing the threat actors with a continuous stream of information and a direct line for further instruction. Security analysts identified this activity by examining specific registry entries, particularly the RunMRU key, which maintains a history of every command entered into the Run box. This digital trail proved to be one of the few pieces of evidence left behind, as the attack primarily operates within the volatile memory of the system. The use of native Windows tools and signed software represents a significant evolution in how modern malware evades detection while maintaining a high success rate.

3. Strategic Mitigation: Protecting Enterprise Infrastructure

The discovery of this campaign highlighted the urgent need for a shift in defensive strategies that prioritize the monitoring of native administrative tools rather than just external file downloads. Security teams responded by implementing stricter controls over the Windows Run dialog and enhancing the visibility of the net use command within corporate environments. Organizations also began to audit the use of asar files and other modular application components that could be susceptible to internal replacement. These proactive measures were supported by the identification of specific malicious domains, including itexe.pl and various spoofed cloudflare subdomains, which were quickly added to global blocklists. By focusing on the behavior of the system rather than just the reputation of the files, defenders were able to close the gap that these interactive scams attempted to exploit. This transition to a more holistic view of system integrity became the standard approach for mitigating similar living-off-the-land techniques throughout the remainder of 2026.

Moving forward, the primary defense against these interactive scams must involve a combination of technical restrictions and comprehensive user training that emphasizes the dangers of copying unknown text to the clipboard. Administrators should consider disabling the remote drive mapping functionality for standard users who do not require it for their daily tasks, effectively breaking the chain of infection. Furthermore, monitoring for unusual activity within the RunMRU registry key can provide early warning signs of an attempted compromise before the final payload is fully deployed. Modern endpoint detection and response systems should be configured to flag the execution of network-related commands originating from the Run box, especially when followed by the launch of unsigned or modified application modules. These steps ensured that while the methods of cybercriminals continued to evolve, the ability of organizations to detect and neutralize such threats remained robust. The lessons learned from this ClickFix variant provided a roadmap for addressing future attempts at utilizing administrative shortcuts for malicious gain.

Advertisement

You Might Also Like

Advertisement
shape

Get our content freshly delivered to your inbox. Subscribe now ->

Receive the latest, most important information on cybersecurity.
shape shape