ClickFix attackers using recent tactic to evade detection, says Microsoft – Computerworld

“And all Windows computers should already be restricted in order that random, unsigned (not signed by the organization), PowerShell commands shouldn’t be allowed. Every organization and machine should have already got the next PowerShell command setting: ‘Set-ExecutionPolicy Restricted -Force‘ enabled. If not, your organization’s cybersecurity risk is much higher than it must be.” 

Payload chain ‘built to last’

Joshua Roback, principal security solution architect at Swimlane, noted the campaign outlined by Microsoft pushes the ClickFix playbook into more trusted, on a regular basis workflows by getting users to run pasted command content inside legitimate Windows tooling that feels routine and protected. That matters, he said, since it slips past the same old mental red flags people associate with sketchy popups, and it could also dodge a number of the controls and detections that security teams have tuned to the more obvious ClickFix patterns.

The payload chain can be more built to last than previous variants, he added. As a substitute of a fast one-and-done retrieval trick, it uses a more layered delivery and persistence approach that helps it mix in, stick around longer, and quietly escalate the damage once it lands. One path adds a further indirection layer that helps the attacker’s infrastructure mix in and stay reachable, which might make takedowns and simple blocking so much less effective.

Related Post

Leave a Reply