

ClickFix represents a highly effective social engineering technique that exploits user trust and legitimate system interfaces to achieve initial compromise. First observed in October 2023, this attack method convinces victims to manually execute malicious commands by copying and pasting content into the Windows "Run" dialog box or terminal, effectively circumventing traditional security controls designed to prevent automated execution.
The sophistication of ClickFix campaigns has evolved dramatically since their inception. Modern variants leverage trusted brand identities, employ JavaScript injection to populate clipboard contents automatically, and have expanded beyond Windows to target macOS and Linux systems. By exploiting the human element rather than technical vulnerabilities, threat actors have created an attack vector that remains effective even against organizations with robust endpoint security.
Key characteristics of ClickFix attacks include:
Microsoft's 2025 Digital Defense Report revealed that ClickFix emerged as the most prevalent initial access method in 2025, representing 47% of observed attacks. This dramatic surge demonstrates how rapidly threat actors have adopted and scaled this technique across their operations.

Modern ClickFix campaigns increasingly leverage fake Cloudflare bot verification pages, which have become ubiquitous across the legitimate web. These sophisticated lures include several enhancements designed to maximize victim compliance:
As noted by Push Security researchers: "It almost looks like Cloudflare shipped a new kind of bot check service. The embedded video, countdown timer, and counter for 'users verified in the last hour' all serve to increase the sense of authenticity, and put extra pressure on the victim to complete the check."
Threat actors have begun weaponizing one of Windows' most recognizable error screens. These attacks use full-screen browser windows to display convincing BSOD replicas that include malicious "recovery" commands. Victims, believing their system has crashed, follow the displayed instructions to "restore" their computer, unknowingly executing the attacker's payload.
Building on the BSOD concept, attackers have also developed fake Windows Update interfaces that mimic the familiar blue update screen. These displays instruct victims to execute commands to "complete" or "accelerate" the update process, leveraging users' familiarity with legitimate Windows update procedures that sometimes require system intervention.
FileFix represents a significant evolution of the ClickFix technique, moving the attack vector from the Run dialog to Windows File Explorer. Instead of copying PowerShell commands, victims are instructed to paste malicious file paths or commands directly into the File Explorer address bar, leading to malware execution through file system manipulation.
A particularly insidious development uses cache smuggling techniques. In these attacks:
This technique effectively bypasses security controls that monitor network traffic and file downloads, as the malicious content technically arrived through a previous, apparently benign web request and is retrieved locally from cache.
Security researchers uncovered PhantomCaptcha, a sophisticated spearphishing operation targeting Ukrainian government agencies and international NGOs, including the Red Cross and UNICEF. The campaign employed the following methodology:
This campaign demonstrates how ClickFix techniques have been adopted by APT-level threat actors for geopolitically motivated operations.
A viral ClickFix campaign spread rapidly through TikTok, leveraging the platform's algorithm to reach millions of potential victims. The scam purported to offer:
Videos instructed viewers to copy and execute commands that appeared to activate these services but instead installed information stealers, cryptocurrency miners, and remote access tools. The campaign's virality was amplified by teenagers and young adults sharing the videos with friends, believing they were distributing helpful software hacks.
The KongTuke campaign represented a mass-compromise operation affecting thousands of legitimate websites:
Researchers also documented a FileFix variant within this campaign that deployed a PHP-based RAT through Windows File Explorer manipulation, demonstrating the attackers' technical sophistication and willingness to employ multiple attack vectors simultaneously.
The effectiveness of ClickFix has attracted attention from nation-state threat actors. Security researchers have observed multiple Advanced Persistent Threat (APT) groups incorporating ClickFix-style lures into their operational toolkits, including:
This adoption by sophisticated state-sponsored groups validates the technique's effectiveness against even security-conscious targets and suggests ClickFix will remain a persistent threat for years to come.
The underground cybercrime economy has rapidly commoditized ClickFix capabilities. Specialized builders and "ClickFix-as-a-Service" offerings are now readily available on dark web forums and Telegram channels:
Basic packages ($200-$500):
Premium subscriptions ($1,000-$1,500/month):
This commercialization has dramatically lowered the technical barrier to entry, enabling low-skill cybercriminals to execute sophisticated social engineering campaigns. The availability of turnkey ClickFix tools ensures this threat will continue proliferating across the threat landscape.
The next evolution of ClickFix attacks will likely continue blurring the distinction between code executing locally on the victim's system and code running within the browser sandbox. This convergence creates detection challenges:
As artificial intelligence becomes more accessible, threat actors will likely leverage generative AI to create hyper-personalized ClickFix campaigns:
Todyl's Security Platform includes multiple detection rules specifically designed to identify ClickFix attacks:
Detects when a ClickFix attack leverages rundll32.exe to execute a remote DLL payload, a common technique for initial stage execution that loads additional malware components.
Identifies when a user executes a PowerShell command containing ClickFix-associated phrases such as "I am not a robot reCAPTCHA" or "I am Human" through the Windows Run dialog, indicating a social engineering compromise.
Detects MSHTA-based ClickFix attacks where victims paste commands invoking Microsoft's HTML Application host to download and execute malicious scripts or applications.
Monitors suspicious modifications to the Windows RunMRU (Most Recently Used) registry key, which records commands executed through the Run dialog and often contains forensic evidence of ClickFix attacks.
For more information on ClickFix being stopped in the wild, read this piece on how our team uncovered an attack live.
For similar breakdowns and threat coverage, read more threat intelligence from Todyl’s research team.
Learn how you can protect what you built.
Subscribe to our newsletter to get our latest insights.