hlk_logo

"Moving to E5 has been really good from a security point of view... Now we can get a holistic view of whatโ€™s going on, which helps us to make changes and recommendations for future plans."

IT Service Manager
Ian Harkess
Trusted by industry leaders
NHS Confederation Logo

Are You Eligible For Free Funding?

Fill out the short form below to express your interest in our funded Microsoft security engagements, and weโ€™ll be in touch soon.

Please note: A minimum of 300 Microsoft 365 enterprise licenses are required to meet basic eligibility requirements.
ENQUIRY - Popup w/ MCI for dark backgrounds (#29)
hlk_logo

"Moving to E5 has been really good from a security point of view... Now we can get a holistic view of whatโ€™s going on, which helps us to make changes and recommendations for future plans."

IT Service Manager
Ian Harkess
Trusted by industry leaders
NHS Confederation Logo

Kickstart Your FastTrack Journey

Fill out the short form below to express your interest in our FastTrack programme, and weโ€™ll be in touch soon.

Please note: A minimum of 150 enterprise licenses is required for FastTrack eligibility.
ENQUIRY - Popup w/ Fasttrack for dark backgrounds (#28)

โ€œWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ€

IT Operations Manager
Simon Darley
Trusted by industry leaders

Let's Talk

Call us on one of the numbers below, we cover the whole of the UK, so call the nearest office.

BriSTOL HQ & The South West

London & Surrounding Areas

Manchester & the North

Keep up to date with the experts

Get insights directly to your email inbox

MAIL LIST - Newsletter, Exit Intent Popup (#13)

Follow us on social

โ€œWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ€

IT Operations Manager
Simon Darley
Trusted by industry leaders

Request a Call

First we need a few details.

ENQUIRY - Popup w/ Captcha for light backgrounds (#21)
Expert Intel

The Rise of Clickfixing: Understanding the Latest Social Engineering Threat

Published: March 20, 2025
Expert: Charlie Kelly
Role: Principal Security Analyst
Specialises in: Incident Response
What you will learn:
In this edition of Expert Intel, youโ€™ll discover what Clickfixing is, why itโ€™s increasingly effective, common techniques threat actors use, and practical steps your organisation can take to defend itself against this emerging social engineering threat. By the end, youโ€™ll have actionable insights to protect your users and infrastructure.
โ€œAttackers are exploiting user trust and familiarity more than ever. If your organisation relies solely on user caution to avoid social engineering threats like Clickfixing, youโ€™re already behind. Combining user education with robust technical measures is now more essential than ever to stay ahead of evolving attacks.โ€

Clickfixing is rapidly becoming one of the most concerning social engineering techniques observed by our analysts at the Stripe OLT SOC. Rather than exploiting technical problems, Clickfixing targets user trust and familiarity with simple verification prompts, tricking victims into executing malicious scripts under the guise of routine human verification tasks.ย 

Clickfixing is a social engineering tactic where attackers use fake dialogue boxes designed to mimic legitimate verification prompts rather than technical errors. Victims, believing they’re simply verifying their identity or proving they’re human, follow provided instructions and unknowingly execute malicious scripts.ย 

Typically, these prompts resemble verification requests such as “Follow these steps to prove you’re human” rather than error messages. Victims encounter instructions that involve copying and pasting commands into PowerShell or the Windows Run dialogue (WinKey+R). Our analysts have also observed attackers silently copying malicious scripts into the victim’s clipboard automatically, further simplifying execution. 

Clickfixing exploits trust and habitual responses:

Users trust prompts that resemble standard verification or CAPTCHA requests.
Minimal interaction and straightforward instructions reduce suspicion.
Users instinctively comply with basic verification procedures without scrutiny.

Our analysts have noted several specific methods:

Clipboard manipulation combined with WinKey+R to quickly execute scripts.
Step-by-step instructions directing users to manually run commands in PowerShell.
Automatic copying of malicious scripts into the clipboard without the user’s knowledge.

The Stripe OLT SOC has observed multiple distribution methods:

Compromised websites:ย Particularly compromised WordPress sites hosting fake CAPTCHAs or redirects.
Actor-owned infrastructure:ย Threat actors create dedicated servers and domains specifically to distribute Clickfix prompts.
Malicious URLs and attachments:ย Embedding malicious links within emails or attachments, directing users to verification prompts.

Clickfix campaigns can lead to command execution, data exfiltration, or deliver second-stage payloads such as:

Information stealers
Ransomware loaders
Remote Access Tools (RATs)

Organisations impacted by Clickfix attacks risk significant consequences, including data breaches, operational disruptions and financial losses.

malicious command forma click fixing attack
An excerpt from a malicious command pasted as a result of a Clickfixing attack

Organisations should proactively adopt measures to combat Clickfixing:

Employee Awareness:ย Educate users specifically about social engineering threats disguised as verification requests.
Technical Controls:ย Implement PowerShell restrictions and endpoint monitoring.
Group Policy Measures:ย Apply Group Policies to restrict the Windows Run dialogue (WinKey+R) and unauthorised script execution.
Policy Enforcement:ย Limit administrative privileges to reduce unauthorised script execution effectiveness.

Understanding Clickfixing and proactively addressing this threat through vigilant awareness and technical safeguards is essential. Organisations equipped with these defences will significantly mitigate the impact of this rising social engineering tactic. As social engineering continues to evolve, it’s essential for organisations to stay informed about emerging threats like Clickfixing. By fostering a security-conscious culture, continuously updating defensive strategies, and maintaining robust technological controls, organisations can significantly reduce their vulnerability to these sophisticated attacks and better protect their critical assets.

If youโ€™re concerned about emerging threats like Clickfixing and want to stay one step ahead of social engineering attacks, our security experts at Stripe OLT are here to help.

Book a free discovery session with us โ€” weโ€™ll assess your current security posture and recommend tailored strategies to protect your organisation from evolving threats.