Summary
Cybersecurity experts have issued alerts regarding a new wave of ClickFix attacks that are targeting unsuspecting users through deceptive websites. Hackers are using schemes where visitors are prompted to copy and paste text into prompts, leading to the installation of malware like the NetSupport remote access trojan (RAT). The latest findings from DomainTools reveal that these attacks exploit human trust and commonly used platforms, resulting in dangerous scripts being executed on Windows machines.
The attackers have created numerous spoofed sites, including fake Docusign verification pages, to trick users into running harmful scripts. These scripts are designed to extract more malicious code, ultimately allowing hackers to gain control over victims’ PCs. The report includes a long list of suspicious website addresses that should be avoided at all costs.
Key Points
- ClickFix attacks are a new cybersecurity threat involving deception to execute malware on Windows PCs.
- Malicious scripts are disguised as legitimate actions, asking users to copy and paste text into prompts.
- Attackers are using fake sites, such as spoofed Docusign pages, to lure victims.
- DomainTools has identified many suspicious domains associated with these attacks.
- Users are advised against pasting commands into prompts, as this is a common method of infection.
Why should I read this?
This article is essential reading if you want to stay safe online. With the rise of ClickFix attacks, knowing what triggers these cyber threats could protect you from malicious attacks and potential data loss. Don’t be caught out—arm yourself with the knowledge to spot and avoid these deceptive traps!