Cybersuze
Cybersuze @cybersuze ·
Beware CAPTCHA Scam Fake "I'm not a robot" prompt tricks you. Don't press Win+R for ANY verification EVER! Real CAPTCHA never asks to run commands or paste code. If "extra verification" has keyboard steps close the tab IMMEDIATELY! Stay safe! #CyberSecurity #ScamAlert #ClickFix
4
Kaspersky Latinoamérica
Kaspersky Latinoamérica @KasperskyLatino ·
¿El mayor riesgo puede ser el propio usuario? #ClickFix demuestra cómo los atacantes convencen a las víctimas de ejecutar código malicioso sin sospechar. Te explicamos en nuestro blog cómo funciona y qué debes evitar. �kas.pr/4efr1B
1
104
mRr3b00t
mRr3b00t @UK_Daniel_Card ·
Tweeps check this out! #ClickFix #MacOs #CyberSecurity #Defences
Malfors Malfors @MalforsHQ ·
Apple shipped ClickFix protection? We just noticed that we can't copy-paste text from the browser to the terminal if it contains a malicious hostname. Very vice!
5
5
3.6K
보안프로젝트
보안프로젝트 @ngnicky ·
macOS-특수 #ClickFix 캠페인, Claude Code 사용자 타겟팅 AMOS Stealer를 사용하여 Claude Code, Grok, n8n, NotebookLM, Gemini CLI, OpenClaw, Cursor와 같은 AI 플랫폼 사용자를 타겟팅하는 캠페인을 확인했습니다.️ 기업 환경에서 macOS 사용이 증가함에 따라 이러한 공격은 가시성 부족을 악용하여 조기 감지를 어렵게 만듭니다.
ANY.RUN ANY.RUN @anyrun_app ·
🚨 𝗺𝗮𝗰𝗢𝗦-𝗦𝗽𝗲𝗰𝗶𝗳𝗶𝗰 #𝗖𝗹𝗶𝗰𝗸𝗙𝗶𝘅 𝗖𝗮𝗺𝗽𝗮𝗶𝗴𝗻 𝗧𝗮𝗿𝗴𝗲𝘁𝗶𝗻𝗴 𝗖𝗹𝗮𝘂𝗱𝗲 𝗖𝗼𝗱𝗲 𝗨𝘀𝗲𝗿𝘀: 𝗗𝗲𝘁𝗲𝗰𝘁 𝗜𝘁 𝗘𝗮𝗿𝗹𝘆 ⚠️ We identified a campaign targeting users of AI platforms such as Claude Code, Grok, n8n, NotebookLM, Gemini CLI, OpenClaw, and Cursor with AMOS Stealer.️ As macOS adoption grows in enterprise environments, these attacks exploit gaps in visibility and make early-stage detection harder. 🎯 In this case, attackers use a redirect from Google ads to a fake Claude Code documentation page and a ClickFix flow to deliver a payload. A terminal command downloads an encoded script, which installs AMOS Stealer, collects browser data, credentials, Keychain contents, and sensitive files, then deploys a backdoor. The backdoor module (~/.mainhelper) was first described by Moonlock Lab in July 2025. Our analysis shows that it has since evolved. While the original version supported only a limited set of commands via periodic HTTP polling, the updated variant significantly expands functionality and introduces a 𝗳𝘂𝗹𝗹𝘆 𝗶𝗻𝘁𝗲𝗿𝗮𝗰𝘁𝗶𝘃𝗲 𝗿𝗲𝘃𝗲𝗿𝘀𝗲 𝘀𝗵𝗲𝗹𝗹 𝗼𝘃𝗲𝗿 𝗪𝗲𝗯𝗦𝗼𝗰𝗸𝗲𝘁 𝘄𝗶𝘁𝗵 𝗣𝗧𝗬 𝘀𝘂𝗽𝗽𝗼𝗿𝘁. ❗️ This turns the infection from data theft into 𝗽𝗲𝗿𝘀𝗶𝘀𝘁𝗲𝗻𝘁, 𝗵𝗮𝗻𝗱𝘀-𝗼𝗻 𝗮𝗰𝗰𝗲𝘀𝘀 𝘁𝗼 𝘁𝗵𝗲 𝗶𝗻𝗳𝗲𝗰𝘁𝗲𝗱 𝗠𝗮𝗰, giving the attacker real-time control over the system. Multi-stage delivery, obfuscated scripts, and abuse of legitimate macOS components break visibility into fragmented signals. Triage slows down, and escalation decisions take longer, leading to credential theft and data exfiltration. ⚡️ #ANYRUN Sandbox lets security teams analyze macOS, Windows, Linux, and Android threats with full visibility into execution, attacker behavior, and artifacts, helping detect threats early, attribute activity, and build stronger detection logic, while reducing MTTD and MTTR. See sample execution in a live analysis session: app.any.run/tasks/74f5000d… 💬 𝗙𝗶𝗻𝗱 #𝗜𝗢𝗖𝘀 𝗶𝗻 𝘁𝗵𝗲 𝗰𝗼𝗺𝗺𝗲𝗻𝘁𝘀 𝗮𝗻𝗱 𝘃𝗮𝗹𝗶𝗱𝗮𝘁𝗲 𝘆𝗼𝘂𝗿 𝗱𝗲𝘁𝗲𝗰𝘁𝗶𝗼𝗻 𝗰𝗼𝘃𝗲𝗿𝗮𝗴𝗲. We’ve broken down the attack chain in detail — let us know if you’d like to see the full analysis! 👨‍💻️ Expand your SOC’s cross-platform threat visibility. Learn how to boost performance and business security with #ANYRUN: any.run/cybersecurity-… #ExploreWithANYRUN
584
lazarusholic
lazarusholic @lazarusholic ·
"EtherRAT & SYS_INFO Module: C2 on Ethereum (EtherHiding), Target Selection, CDN-Like Beacons" published by @eSentire. #ClickFix, #EtherHiding, #EtherRAT, #DPRK, #CTI esentire.com/blog/etherrat-…
eSentire - The Authority in Managed Detection and Response
EtherRAT & SYS_INFO Module: C2 on Ethereum (EtherHiding), Target Selection, CDN-Like Beacons

Learn more about the EtherRAT backdoor, which is being used to conduct targeted attacks, and get security recommendations from our TRU team on how to protect your organization from this cyber threat.

From esentire.com
1
553
Yogesh Londhe
Yogesh Londhe @suyog41 ·
Crack theme + #ClickFix iZotope RX 11 Advanced v1140 WiN-MAC Plugin Crack[.dm 26f886180fadb14563bf0f070faf6c24 Audioreakt 8211 Raw Techno 4 8211 Ableton Template WAV.dmg 9203d7c0dec91c32ae34b46e3c73e46e #MAC #IOC
6
1.3K
Koadi Technology LLC
Koadi Technology LLC @KoadiTechnology ·
Before you click that browser fix! 🛑 The 'ClickFix' trap is a new way hackers get into your system. Koadi's 24/7 team is standing by to help you if you’ve accidentally clicked or just want to ensure your system is clean. 848-266-6363 #CyberSecurity #KoadiTech #ClickFixJ
20
Cybersecurity News Everyday
Cybersecurity News Everyday @TweetThreatNews ·
Insikt Group tracks five ClickFix clusters using fake human-verification lures to run obfuscated commands on Windows and macOS. Payloads include NetSupport RAT and MacSync via in-memory execution. #ClickFix #InMemoryAttack #USA ift.tt/TkLPjxZ
ClickFix Campaigns Targeting Windows and macOS

Insikt Group tracked five ClickFix clusters that use fraudulent human‑verification lures to trick victims into copying and executing obfuscated commands in native tools like the Windows Run dialog...

From hendryadrian.com
76
Yogesh Londhe
Yogesh Londhe @suyog41 ·
Crack theme + #ClickFix Download Antares Auto-Tune Pro 11 WiN-MAC Plugin Crack.dmg 6a69cabec4f469054f7a46ed9ba979f8 Free Download SoundToys 5 PORTABLE WiN Plugin Crack.dmg 4f425aaa5522e239617149305084f9f6 #MAC #IOC
2
681
Hermes Tool
Hermes Tool @Hermes_tooll ·
New #macOS stealer via #ClickFix — First observed using Python + Nuitka onefile — tracking as NukeChain 🍎 Fake Cloudflare CAPTCHA → Terminal paste 📷 bash dropper — junk-fn pattern shared with MacSync/SHub 📷Stage-2: Nuitka arm64 bootstrap (KAY(+zstd) 📷 Python payload, 5,671 named symbols 📷 Keychain: 3 bypass vectors incl. CSSM direct parser 📷 Chromium + Firefox + 18 crypto wallet extensions 📷 operator alerts + server crack queue 📡
1
464
Marcelo Rivero
Marcelo Rivero @MarceloRivero ·
New #macOS stealer via #ClickFix — First observed using Python + Nuitka onefile — tracking as NukeChain 🍎 Fake Cloudflare CAPTCHA → Terminal paste 🪝 bash dropper — junk-fn pattern shared with MacSync/SHub 🧬 Stage-2: Nuitka arm64 bootstrap (KAY(+zstd) 💻 Stage-3: Python payload, 5,671 named symbols 🔐 Keychain: 3 bypass vectors incl. CSSM direct parser 💰 Chromium + Firefox + 18 crypto wallet extensions 📡 HTTP C2 → Telegram operator alerts + server crack queue
2
23
10.2K
SWT Support
SWT Support @SupportSwt26513 ·
Is your screen lying? 💻 We’re seeing a 500% surge in 'ClickFix' traps: fake system errors designed to bypass your defenses. 🛡️ Don't click to 'fix' it. Stop and verify with IT first. Secure your business: swtsupport.com #CyberSecurity #ITSupport #ClickFixN9
21