Security researchers have identified an expanding ClickFix attack campaign that combines fake CAPTCHA pages with signed Microsoft Application Virtualization scripts to distribute the Amatera information stealer.
Attack Technique
ClickFix Method
ClickFix attacks manipulate users into executing malicious commands:
- Lure: User visits compromised or malicious website
- Fake CAPTCHA: Page displays fake verification prompt
- Clipboard hijacking: Malicious PowerShell copied to clipboard
- User execution: Victim instructed to paste and run command
- Payload delivery: Malware downloads and executes
Signed Script Abuse
This campaign leverages legitimate Microsoft Application Virtualization (App-V) scripts:
- Scripts are digitally signed by Microsoft
- Security tools may trust signed executables
- Bypasses some application whitelisting controls
- Adds legitimacy to malicious activity
Amatera Stealer
The Amatera information stealer targets:
- Browser data: Passwords, cookies, history, autofill
- Cryptocurrency wallets: Seed phrases, private keys
- Application credentials: Discord, Telegram, gaming platforms
- System information: Hardware IDs, installed software
- Files: Documents matching specified patterns
Indicators of Compromise
Behavioral indicators:
- PowerShell execution from unusual parent processes
- Clipboard monitoring activity
- Connections to Telegram or Discord APIs for exfiltration
- Access to browser credential stores
User-facing indicators:
- Unexpected CAPTCHA prompts on trusted sites
- Requests to open Run dialog (Win+R)
- Instructions to paste clipboard contents
Protection Measures
For Organizations
- Block PowerShell execution for standard users where possible
- Deploy EDR with behavioral detection capabilities
- Train users on ClickFix social engineering tactics
- Monitor clipboard activity on endpoints
- Restrict Run dialog access via Group Policy
For Individuals
- Never paste commands you don’t understand
- Be suspicious of unusual verification requests
- Verify website legitimacy before interacting
- Use password managers instead of browser storage
- Enable MFA on all accounts