- A researcher has developed a new social engineering attack
- The attack, a variant of the existing click problem, has been called Filefix
- Windows users are at risk, so it’s on guard
A new version of the popular clickfix social engineering tool has been developed, which could put Windows users at risk.
A cybersecurity researcher called MR. Dox has developed a new version of Clickfix, a browser -based attack disguised as captchas to deceive the victims to press a button that then copy a command on the Windows clipboard. From there, users are encouraged to hit the command in a message to ‘solve’ a problem.
The new tool, called Filefix, allows cybercriminals to execute commands in the victims system through the address explorer bar in Windows “, this new attack is a similar premise, but use Windows File Explorer to create a ‘highly plausible scenario’.
Sophisticated social engineering
This version of the Phishing page is not based on a captcha, but a false notification that tells users that they have sent a file, urging them to paste the route on the file explorer to find it.
This method could be armed to deceive users to download malicious users. “However, there is an inconvenience in this variation that should be considered,” argues Mr. Dox.
“Microsoft Defender Smartscreen and Google Safebrowsing will generally warn users before saving executables, so more user clicks may be required to work. However, I still included this method in case someone finds good use for it or wants to use in a different social engineering scenario.”
The clickfix attack has been used by criminals to avoid antivirus software, with new malware variants observed aimed at macOS, Android and iOS users. Any new social engineering attack is dangerous since users will not be broad with the method, so be sure to distrust any unexpected emerging window and close the windows that do not trust.
Through Bleepingcomer