ColdRiver APT Group Exploits ClickFix Technique to Deploy Malware

In recent developments, cybersecurity experts have identified a sophisticated campaign orchestrated by the ColdRiver Advanced Persistent Threat (APT) group. This campaign leverages the deceptive ClickFix technique to infiltrate systems and deploy malicious software. The ClickFix method capitalizes on social engineering tactics, manipulating users into executing harmful commands under the guise of resolving fictitious technical issues.

Understanding the ClickFix Technique

The ClickFix approach involves presenting users with seemingly legitimate prompts, such as error messages or CAPTCHA verifications, that instruct them to perform specific actions. Typically, these actions include opening the Run dialog box (by pressing Windows + R), pasting a pre-copied command, and executing it. Unbeknownst to the user, these commands initiate the download and execution of malicious payloads.

ColdRiver’s Exploitation of ClickFix

The ColdRiver APT group has adeptly incorporated the ClickFix technique into their attack arsenal. Their campaign begins by directing users to counterfeit websites that closely mimic legitimate platforms. For instance, users might encounter a fake BBC News page or a fraudulent Cloudflare verification screen. These sites are meticulously designed to appear authentic, complete with stolen content and replicated branding.

Once on these deceptive sites, users are prompted to complete a verification process. This process instructs them to open the Run dialog box, paste a command that has been surreptitiously copied to their clipboard, and execute it. Executing this command triggers a PowerShell script that downloads and installs various types of malware onto the user’s system.

The Surge of ClickFix Attacks

The ClickFix technique has seen a significant uptick in usage over the past year. According to ESET’s Threat Report, ClickFix attacks increased by over 517% in the first half of 2025, making it the second most common attack vector after phishing. These attacks now account for nearly 8% of all blocked cyber threats. The effectiveness of ClickFix lies in its ability to exploit users’ trust in familiar verification processes and their inclination to resolve technical issues promptly.

Diverse Malware Payloads

The ColdRiver group’s use of ClickFix has facilitated the deployment of a variety of malware strains. Notably, they have distributed information stealers like Lumma Stealer, remote access trojans such as NetSupport RAT, and other malicious software including DarkGate and AsyncRAT. These malware types serve different purposes, from harvesting sensitive information to providing attackers with remote control over compromised systems.

Evasion Techniques

To evade detection, the ColdRiver group employs several sophisticated techniques. The malicious PowerShell commands are often Base64-encoded and designed to terminate execution if they detect virtual machine environments, a common setting for security analysis. Additionally, the fake verification pages are crafted with authentic-looking elements, including logos and footers, making them difficult to distinguish from legitimate pages.

Expanding Attack Vectors

Beyond traditional ClickFix methods, the ColdRiver group has expanded their tactics. They have been observed using fake Google Meet and Zoom pages to distribute malware. In these instances, users encounter fraudulent error messages on what appear to be legitimate video conferencing platforms, instructing them to perform actions that lead to system compromise.

Protection and Prevention

To defend against ClickFix attacks, individuals and organizations should adopt several protective measures:

– Exercise Caution with Unsolicited Commands: Never execute commands from websites or emails, regardless of how legitimate they appear.

– Disable the Windows Run Dialog: Through Group Policy or registry modifications, disabling the Run dialog can prevent the execution of malicious commands.

– User Education: Train users to recognize fake verification screens and suspicious prompts.

– Implement Behavioral Monitoring: Utilize security software that can detect unusual PowerShell or command-line activity.

It’s crucial to remember that legitimate services, such as Cloudflare, do not require users to interact directly with their operating system or execute terminal commands as part of verification processes. Any website requesting such actions should be considered suspicious and avoided.

Industry Response

The cybersecurity community has responded to the ClickFix threat with enhanced detection capabilities and awareness campaigns. Companies like Microsoft have been tracking specific campaigns under threat actor designations, while security firms like ESET and Proofpoint have developed specialized detection rules for identifying ClickFix attacks. The rapid evolution and growing sophistication of ClickFix attacks highlight the ongoing challenge of defending against social engineering techniques that exploit human psychology rather than technical vulnerabilities.

Conclusion

The ColdRiver APT group’s exploitation of the ClickFix technique underscores the evolving nature of cyber threats. By combining social engineering with technical sophistication, these attacks effectively deceive users into compromising their own systems. As these tactics become more prevalent, continuous vigilance, user education, and robust security measures are essential components of a comprehensive cybersecurity defense strategy.