New ClickFix Attack Targets Windows Users with StealC Malware


A new wave of ClickFix attacks tricks Windows users into running StealC stealer malware through fake CAPTCHA pages on hacked websites. Victims think they complete a Cloudflare security check. Instead, they execute PowerShell commands that deploy the info-stealer.

These campaigns mix social engineering with technical tricks. Compromised sites load JavaScript that shows phony verification screens. Users follow steps like pressing Windows Key + R, pasting code, and hitting Enter. This launches a multi-stage infection without saving files to disk.

LevelBlue researchers tracked the full chain. It starts with PowerShell fetching shellcode from remote servers. That shellcode uses the Donut framework to load a 64-bit downloader. The downloader then injects StealC into svchost.exe, a trusted Windows process.

StealC grabs browser credentials from Chrome, Edge, and Firefox. It also targets crypto wallets like MetaMask, Steam files, Outlook data, and system screenshots. Attackers encode C2 traffic with Base64 and RC4 for stealth.

LevelBlue noted: “ClickFix opens the door to stealthy StealC information stealer by exploiting user trust in security prompts.” Their report details: “The campaign downloads position-independent shellcode, reflectively loads a PE downloader, and injects into legitimate processes.”

Attack Flow

credit – LavelBlue

The infection avoids disk writes for evasion.

StageActionEvasion Technique
1. Site VisitLoads fake CAPTCHA JSMimics Cloudflare UI
2. User InputRuns PowerShell via Run dialogSocial engineering
3. Shellcode DLFetches from C2 serverDonut framework, memory-only
4. DownloaderCustom Visual C++ PEInjects into svchost.exe
5. StealCSteals data, exfilsDual obfuscation, RC4 encrypt ​

Stolen Data Types

  • Browser logins and cookies (Chrome, Edge, Firefox).
  • Crypto extensions (MetaMask, Coinbase Wallet).
  • Gaming creds (Steam auth files).
  • Email data (Outlook).
  • System info plus screenshots.

Detection Signs

Monitor for odd PowerShell with encoded args. Flag User-Agent “Loader” in traffic. Watch VirtualAlloc calls or browser DB access. Check svchost anomalies via EDR tools.​

Protection Steps

  • Block PowerShell from web downloads via AppLocker.
  • Train users on fake CAPTCHAs; never paste Run commands.
  • Scan with updated AV; enable AMSI for script checks.
  • Use browser extensions to block malicious sites.
Defense LayerKey ActionTools
EndpointEnable script block loggingMicrosoft Defender
NetworkFilter suspicious User-AgentsProxy/WAF
UserAwareness trainingPhishing sims
ResponseHunt shellcode patternsSysmon, EDR ​

FAQ

How does ClickFix trick users?

Fake Cloudflare CAPTCHA prompts Win+R, paste, Enter to run malware.

What data does StealC steal?

Credentials, crypto wallets, emails, screenshots from browsers and apps.

Why is it hard to detect?

Fileless; runs in memory, injects into legit processes like svchost.

How to block these attacks?

Constrain PowerShell, monitor encoded commands, update EDR rules.

Who targets these campaigns?

Cybercriminals selling stolen data on underground markets.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages