Skip to content

Commit 1ae09c4

Browse files
committed
feat(rules): Add Clickfix phishing via browser dialog box rule
Identifies a ClickFix-style social-engineering phishing attempt and its FileFix evolution where a web page coerces a user into interacting with a trusted File Explorer address bar so that a clipboard-pasted value executes a command on the host. Attackers use convincing browser lures (fake CAPTCHAs, shared-file prompts, account-suspension pages, etc.) to cause the browser to open a native dialog or explorer window and simultaneously place a malicious command on the clipboard. When the user pastes that content into the trusted UI it runs with their privileges, often bypassing Mark-Of-The-Web checks and many automated protections.
1 parent 1ccb7b3 commit 1ae09c4

File tree

1 file changed

+36
-0
lines changed

1 file changed

+36
-0
lines changed
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
name: Clickfix phishing via browser dialog box
2+
id: 5fc4bf43-fbb6-4a78-a2cc-1fe9138bd3c2
3+
version: 1.0.0
4+
description: |
5+
Identifies a ClickFix-style social-engineering phishing attempt and its FileFix evolution
6+
where a web page coerces a user into interacting with a trusted File Explorer address bar so
7+
that a clipboard-pasted value executes a command on the host. Attackers use convincing browser
8+
lures (fake CAPTCHAs, shared-file prompts, account-suspension pages, etc.) to cause the browser
9+
to open a native dialog or explorer window and simultaneously place a malicious command
10+
on the clipboard. When the user pastes that content into the trusted UI it runs with
11+
their privileges, often bypassing Mark-Of-The-Web checks and many automated protections.
12+
labels:
13+
tactic.id: TA0001
14+
tactic.name: Initial Access
15+
tactic.ref: https://attack.mitre.org/tactics/TA0001/
16+
technique.id: T1566
17+
technique.name: Phishing
18+
technique.ref: https://attack.mitre.org/techniques/T1566/
19+
references:
20+
- https://thehackernews.com/2025/06/new-filefix-method-emerges-as-threat.html
21+
- https://www.bridewell.com/insights/blogs/detail/filefix-the-evolved-clickfix
22+
- https://blog.checkpoint.com/research/filefix-the-new-social-engineering-attack-building-on-clickfix-tested-in-the-wild/
23+
24+
condition: >
25+
spawn_process and ps.parent.name iin web_browser_binaries and
26+
(ps.name iin script_interpreters or ps.name iin ('msiexec.exe', 'rundll32.exe', 'curl.exe', 'wget.exe', 'certutil.exe', 'certreq.exe', 'msbuild.exe') or
27+
ps.exe imatches '?:\\Users\\*\\Downloads\\*') and
28+
thread.callstack.summary imatches 'ntdll.dll|*|windows.storage.dll|shell32.dll|windows.storage.dll|SHCore.dll|*'
29+
action:
30+
- name: kill
31+
32+
output: >
33+
Process %ps.exe execution via potential Clickfix phishing browser dialog box
34+
severity: high
35+
36+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)