Security researchers have identified an expanding ClickFix attack campaign that combines fake CAPTCHA pages with signed Microsoft Application Virtualization scripts to distribute the Amatera information stealer. The technique has become so prevalent that it now accounts for 47% of attacks observed by Microsoft.

Campaign overview

AttributeDetails
Campaign nameEVALUSION
Tracked byeSentire
Primary payloadAmatera Stealer
Secondary payloadNetSupport RAT
Delivery methodClickFix social engineering
Prevalence47% of observed attacks (Microsoft)
First seenLate 2024
Current statusActive and expanding

What is ClickFix?

ClickFix is a social engineering technique that manipulates users into executing malicious commands through a deceptive sequence:

Compromised website → Fake CAPTCHA → Clipboard hijack → User runs command → Malware execution

The attack exploits user conditioning around verification prompts—people are accustomed to solving CAPTCHAs and tend to follow instructions without questioning them.

Why ClickFix works

FactorExploitation
CAPTCHA fatigueUsers are conditioned to comply
Trust indicatorsProfessional-looking pages
Urgency creation”Verify now” messaging
Authority appearanceImpersonates legitimate sites
Minimal suspicionNo download prompts

Attack chain breakdown

Stage 1: Initial access

Users visit a compromised or malicious website displaying what appears to be a legitimate verification prompt:

Lure typeExamples
Fake CAPTCHA”Verify you are human”
Site impersonationBooking.com, corporate portals
Error message”Fix display issue”
Verification gate”Prove you’re not a bot”

The pages are professionally designed to match legitimate verification services.

Stage 2: Clipboard hijacking

Behind the fake CAPTCHA, JavaScript silently copies malicious PowerShell code to the victim’s clipboard.

Technical detailImplementation
TriggerUser interaction with page
MethodJavaScript clipboard API
PayloadEncoded PowerShell command
VisibilityHidden from user

Stage 3: Social engineering

The page instructs users to:

StepUser action
1Press Win + R to open the Run dialog
2Press Ctrl + V to paste
3Press Enter to execute

The instructions may be framed as:

  • Completing verification
  • Fixing a display issue
  • Confirming identity
  • Bypassing an error

Stage 4: Payload delivery

The pasted command triggers a multi-stage delivery chain:

StageAction
Initial PowerShellDownloads payload from C2
Image downloadFetches PNG from CDN
SteganographyExtracts data hidden in images via LSB steganography
DecryptionDecrypts and decompresses payload (GZip)
Memory executionRuns entirely in memory to evade detection
ShellcodeNative shellcode maps and executes Amatera

Stage 5: Signed script abuse

The campaign leverages Microsoft Application Virtualization (App-V) scripts that are digitally signed by Microsoft. This:

BenefitExplanation
Bypasses application whitelistingSigned by trusted publisher
Evades security toolsTrusted certificate
Adds false legitimacyMicrosoft signature
Reduces detectionKnown-good binaries

Amatera Stealer capabilities

Amatera is an evolution of ACR (AcridRain) Stealer, available as malware-as-a-service (MaaS).

Development history

DateEvent
Mid-2024ACR Stealer sales suspended
June 2025Amatera first observed
2025-2026Active MaaS operations

Pricing

PlanCost
Monthly$199
Annual$1,499

Data theft targets

CategoryTargets
BrowsersPasswords, cookies, history, autofill, payment cards
CryptocurrencyWallet files, seed phrases, private keys
MessagingDiscord tokens, Telegram sessions
EmailClient credentials, cached emails
FTPFileZilla, WinSCP credentials
GamingSteam, Epic Games, other platform credentials
SystemHardware IDs, installed software, screenshots
2FAAuthenticator app data

Targeted applications

CategoryApplications
BrowsersChrome, Firefox, Edge, Brave, Opera
WalletsMetaMask, Exodus, Electrum, Atomic, Coinbase
MessagingDiscord, Telegram, Signal
EmailOutlook, Thunderbird
VPNNordVPN, ProtonVPN configs
Password managersBrowser-stored credentials

Evasion techniques

Amatera employs advanced detection evasion:

TechniquePurpose
WoW64 SysCallsBypasses user-mode hooking used by EDR
In-memory executionNo files written to disk
AMSI patchingDisables Windows anti-malware scanning
Sandbox detectionIdentifies analysis environments
Time-based checksStalls in sandbox environments
Anti-debuggingDetects debugger presence

Command and control infrastructure

The EVALUSION campaign uses highly resilient C2 leveraging legitimate services:

ServicePurpose
Google CalendarConfiguration delivery
jsDelivr CDNPayload hosting
Binance BNB Smart ChainDecentralized configuration storage
Image hostingSteganographic payload delivery
TelegramExfiltration channel

Blockchain C2 resilience

Using blockchain for configuration makes takedown nearly impossible:

FactorImplication
Immutable storageData cannot be removed
DecentralizedNo single point of failure
Legitimate serviceCannot be blocked wholesale
Censorship resistantSurvives takedown attempts

Exfiltration endpoints rotate frequently, complicating detection and response.

Detection indicators

Behavioral indicators

IndicatorDetection value
PowerShell execution from Run dialogHigh
Clipboard monitoring activityMedium
Connections to Telegram/Discord APIs from unexpected appsHigh
Access to browser credential storesHigh
Image downloads followed by unusual memory activityMedium
App-V script execution in unusual contextHigh

User-visible signs

SignRisk indication
Unexpected CAPTCHA promptsPotential ClickFix
Requests to open Run dialog (Win + R)Attack in progress
Instructions to paste clipboard contentsMalicious payload
”Verification” that doesn’t match site behaviorCompromise
Pop-up errors requiring “fixes”Social engineering

Network indicators

IndicatorMeaning
HTTP requests with mismatched Host header/SNI and destination IPC2 communication
Connections to Google Calendar API from unexpected processesConfiguration retrieval
jsDelivr requests for suspicious contentPayload delivery
Telegram API exfiltration trafficData theft
BNB Smart Chain API callsConfiguration lookup

File system indicators

ArtifactLocation
Downloaded PNG filesTemp directories
PowerShell transcript logsIf logging enabled
Browser data access timestampsProfile directories

Defensive recommendations

For organizations

ControlImplementation
Restrict Run dialogGroup Policy to disable Win + R for standard users
PowerShell constraintsConstrained Language Mode, execution policy
Remove App-VUninstall if not business-required
EDR with behavioral detectionDetect clipboard abuse and memory-only execution
PowerShell loggingEnable ScriptBlock and Module logging
Network monitoringAlert on C2 infrastructure patterns
Application whitelistingBlock unsigned scripts

Group Policy recommendations

SettingConfiguration
Disable Run commandUser Configuration → Administrative Templates → Start Menu
PowerShell execution policyAllSigned or Restricted
Script Block LoggingEnable in PowerShell policies
Module LoggingEnable in PowerShell policies

For users

ActionRationale
Never paste commands you don’t understandCore defense
Be suspicious of unusual verification requestsRecognition
Verify website legitimacyURL inspection
Use dedicated password managerNot browser storage
Enable MFA on all accountsReduce stolen credential impact
Report suspicious websitesOrganizational awareness

For security awareness training

Include ClickFix in phishing simulations:

ScenarioTraining value
Fake CAPTCHARecognition training
Run dialog abuse attemptsProcedure awareness
”Paste and run” requestsRisk understanding
Impersonated verificationBrand awareness

ClickFix has been adopted by multiple threat actors:

ActorCampaignTarget
Various criminalsEVALUSIONGeneral population
APT groupsTargeted campaignsSpecific organizations
MaaS operatorsMultipleBroad targeting

Context

ClickFix represents a shift in attack methodology—rather than exploiting software vulnerabilities, it exploits human conditioning around verification prompts. Users are trained to expect and comply with CAPTCHAs, making the social engineering highly effective.

EvolutionImplication
From malware exploitsTo social engineering
From file downloadsTo clipboard abuse
From untrusted codeTo signed Microsoft binaries
From detectable payloadsTo memory-only execution

The technique’s prevalence (47% of observed attacks) indicates it works. Combined with sophisticated evasion techniques and resilient infrastructure, campaigns like EVALUSION pose significant risk to organizations and individuals.

Defense requires both technical controls (restricting Run dialog, PowerShell constraints) and user education (recognizing unusual verification requests). Neither alone is sufficient against well-crafted social engineering.

The use of blockchain for C2 configuration represents an emerging challenge—attackers are building infrastructure that cannot be taken down through traditional means, requiring defenders to focus on detection and user awareness rather than infrastructure disruption.