Evolving ClickFix Malware Uses Video Tutorials and OS Detection to Trick Users into Self-Infection
November 6, 2025
ClickFix malware campaigns have evolved to include video tutorials that guide victims through self-infection, use OS detection to tailor commands, and feature a one-minute countdown to pressure quick action.
Security guidance now emphasizes that legitimate verification processes never require executing commands or pasting code into a terminal, and users should not run copied commands without full understanding.
Social engineering remains central, with attackers luring victims to paste and execute code from malicious pages, often using deceptive verification or software-solution themes.
The 2026 CISO Budget Benchmark report is referenced, highlighting how security leaders plan budgeting and prioritization for 2026 and focus on measuring the impact of security investments.
Push Security warns that future ClickFix campaigns could run entirely in the browser to avoid detection by endpoint protection and response tools.
Attack delivery relies on malvertising via Google Search and compromised or SEO-poisoned sites, exploiting outdated WordPress plugins to inject malicious JavaScript.
The malware uses OS-specific payloads—MSHTA on Windows and PowerShell scripts—with a history of targeting macOS and Linux, and now features automated instruction adjustment as a key advancement.
Newer campaigns embed instructional videos on fake Cloudflare CAPTCHA checks, enabling automatic clipboard pasting of commands and reducing user hesitation during execution.
Summary based on 1 source
Get a daily email with more Tech stories
Source

BleepingComputer • Nov 6, 2025
ClickFix malware attacks evolve with multi-OS support, video tutorials