The North Korean state-sponsored hacking group Kimsuky has used a fraudulent technique called "ClickFix" to gain control over victim machines via sophisticated social engineering. ClickFix was first seen in April 2024 by Proofpoint, which misleads users into running malicious scripts by presenting them as the authentic troubleshooting manual or secure document verification procedure. This method, heavily associated with the continuous "BabyShark" attack campaign of Kimsuky, has since been utilized by Iranian and Russian threat actors, according to reports by Sekoia and Proofpoint. Early in 2025, Genians Security Center (GSC) detected ClickFix activity, stressing the need for robust endpoint detection and response (EDR) solutions. The usual campaign starts with professionally designed spear-phishing messages. In one case in January 2025, an attacker pretending to be a Swiss journalist targeted a South Korean diplomatic expert. Building trust first, the attacker sent a malicious URL with an obfuscated Visual Basic Script (VBS), which downloaded further payloads, set up persistence via scheduled tasks, and exfiltrated information. In March 2025, Kimsuky adopted a ClickFix variant that used PowerShell commands within a "Code.txt" file, masquerading as a secure document procedure. The commands, frequently concealed with reverse-order obfuscation, duplicated previous VBS-based attacks and led to C2 servers such as raedom\[.]store. During a different campaign, the attackers enticed victims via a false defense employment portal and prompted them to download Chrome Remote Desktop, obtaining remote SSH capabilities. Linguistic markers like North Korean words "??" (tomorrow) and "??" (command) contributed to Kimsuky's attribution of these attacks. ClickFix, which falls under MITRE ATT\\&CK's User Execution: Malicious Copy and Paste (T1204.004), is based heavily on psychological manipulation. Organizations are strongly encouraged to focus on user awareness training and invest in proactive EDR software such as Genian EDR to identify script running and odd system behavior at an early stage.
A large-scale phishing campaign has been identified leveraging RFQ (Request for Quotation) themed emails to distribute credential-stealing malware. Attackers disguise malicious HTM...
Two critical vulnerabilities in Progress ShareFile have been identified that can be chained to achieve pre-authentication remote code execution (RCE). Discovered by watchTowr resea...
The FBI has issued a warning highlighting potential security and privacy risks associated with widely used mobile applications developed by Chinese companies. These applications, a...