Cybersecurity Knowledge Base
CyberPedia
Your essential guide to cybersecurity threats, attacks, and defenses.
Understand the risks. Protect your business.
ClickFix Attack
Overview
The ClickFix attack is a type of online scam where criminals trick people into running harmful commands on their own computers by following “helpful” on‑screen instructions. Instead of silently hacking in the background, ClickFix convinces the victim to do the dangerous part themselves—usually in just a few clicks or keystrokes.
What It Looks Like
ClickFix almost always appears as something routine and harmless, such as:
A fake “I’m not a robot” check or CAPTCHA
A “Verify you are human” or “Security check” page
A fake “video call problem” or “your browser is out of date” message
A fake error or warning saying something like “Fix this issue by following these steps”
These messages show up after you click a link in a phishing email, an online ad, a search result, a YouTube/tutorial link, or on a legitimate site that has been compromised. The page then walks you through a short set of steps, often with pictures or big highlighted instructions.
Typical Attack Steps
While the wording and design can change, the basic pattern is very similar across ClickFix attacks:
You land on a fake help/verification page
This may look like a Google reCAPTCHA, a video call join screen, a “document viewer,” or a system fix screen.
The page silently loads a command into your clipboard
Behind the scenes, the page uses code in the browser to copy a hidden command (often a one‑line script) into your clipboard without you realizing it.
The page gives you simple keyboard instructions
Common sequence on Windows:
“Press Windows key + R” (opens the Run box)
“Press Ctrl + V” (pastes the hidden command)
“Press Enter” (runs the command)
Variants may tell you to paste into the browser address bar, a terminal, or another system dialog, and similar tricks exist for macOS and mobile devices.
Your computer runs the pasted command
The command typically launches PowerShell or another script tool, which then downloads and runs malware from the internet.
Malware takes over quietly
After this, your computer may be infected with tools that can steal data, allow remote control, or pull in more malicious software.
What Attackers Want
The main goals of a ClickFix attack are to:
Steal passwords and sensitive data
Using “infostealer” malware to grab logins, saved browser passwords, crypto wallets, and other stored secrets.
Gain remote control of devices
Installing remote access tools (RATs) so attackers can watch your screen, move your mouse, and run programs as if they were sitting at your computer.
Break into company systems
Using your device as a stepping stone into business networks, file shares, email, and cloud accounts.
Sell access as a service
Some criminals package ClickFix kits and sell them to others, so even low‑skill attackers can run campaigns.
Why ClickFix Is Hard to Catch
ClickFix is effective because it turns the victim into the “installer.”
Security tools often look for programs that download and run files on their own; here, you typed or pasted the command, so it can look like a “normal” action.
The attack skips the usual download prompts and browser warnings by pulling code directly into tools like PowerShell.
The steps feel like typical online friction—“verify you’re human,” “fix a display issue,” “update your player”—so people don’t see them as dangerous.
How to Recognize a Possible ClickFix Attack
Treat it as suspicious if you see any combination of the following when browsing or opening links:
A webpage that suddenly:
Asks you to “fix” something by typing or pasting commands
Shows step‑by‑step keyboard shortcuts (for example, “Press Windows+R, then Ctrl+V, then Enter”)
Claims you must do this to watch a video, open a document, or prove you’re not a bot
Pages that look slightly “off”:
CAPTCHA or security pages that don’t match the usual style you see from Google, Microsoft, or other familiar brands
Poor spelling, strange wording, or odd domain names
Instructions that involve:
The Windows Run box, PowerShell, Command Prompt, Terminal, or any system‑level tool
Copying and pasting long lines of text you don’t understand
If you ever think, “I’m not sure why I’m doing this, but the website says I have to,” stop and assume it may be malicious.
Business Impact
For businesses, a single successful ClickFix attack can lead to:
Compromised email, cloud storage, and internal applications
Stolen customer or employee data
Ransomware or other follow‑on attacks delivered from the same infected machine
Regulatory, legal, and reputational damage if sensitive information is exposed
Key Prevention Tips (Plain‑Language)
For non‑technical staff, the most important rules around ClickFix are behavioral:
Never follow website instructions that tell you to open PowerShell, Command Prompt, Terminal, or the Windows Run box and paste in a command.
Treat any “verification” or “fix” that includes keyboard shortcuts as suspicious, especially if you got there via an email link or online ad.
Close the browser tab immediately if something feels off. If needed, manually re‑type the company or service’s address into the browser instead of clicking links.
Report it to IT or your security contact right away, especially if you already followed some steps. The sooner they know, the more they can limit damage.
Keep systems updated and use reputable security software, which can still block many of the tools that ClickFix tries to install.