Beware of PowerShell: Very useful users have been tricked into ‘fixing’ their machines with malware

However, in order to overcome detection, scripts first perform a check to ensure that the user was not running on a virtual machine or in a sandbox (a common way for researchers to check suspicious sites without installing their machines); if a VM or sandbox is found, the script exits without performing its malicious operations.

Click on Fix

Another threat actor pops up a message saying something went wrong while displaying a web page, and (surprisingly!) the user has to copy the code to fix it and install it using PowerShell. Like ClearFake, it provided clear instructions on how to “compile” the program. ProofPoint said the exploit lasted only a few days before becoming inactive, and a few days later, it was replaced by the ClearFake exploit. “Like please[.]es the site itself appears to be vulnerable, it is not clear if the two applications – ClearFake and ClickFix – started working together, or if the ClearFake actor also compromised the iframe, encoding its content,” said ProofPoint. Its post -blog However, the ClearFake compromise still works for ClickFix-infected sites.

“Keys work,” said David Shipley, CEO and founder of Beauceron Security, “because they’re meant to help people, use language that common people see but don’t understand (certificates) and look closely enough at the actual chat buttons. if you are busy, inexperienced, or frustrated, look real enough.”


Source link