Executive Summary
Insikt Group identified five distinct clusters leveraging the ClickFix social engineering technique to facilitate initial access to host systems. Observed since at least May 2024, these clusters include those impersonating financial application Intuit QuickBooks and the travel agency Booking.com. Insikt Group leveraged the Recorded Future® HTML Content Analysis dataset, which enables systematic monitoring of embedded web artifacts to identify and track new malicious domains and infrastructure.
The clusters demonstrate significant operational variance in lure themes and infrastructure patterns, and highlight the technique’s evolution, moving past simple verification by visually fooling victims with various fake challenges and demonstrating technical sophistication through operating system detection to tailor execution chains. Despite these structural differences, its operation is largely the same, showing that ClickFix’s core techniques work across platforms and only the social engineering lure needs to be adapted to the victim. Threat actors manipulate victims into executing malicious, obfuscated commands directly within native system tools like the Windows Run dialog box or macOS Terminal.
This living-off-the-land (LotL) approach allows malicious scripts to execute in-memory, effectively bypassing traditional browser security and endpoint controls. Parallel clusters targeting sectors as diverse as accounting, real estate, and legal services indicates that ClickFix has transitioned into a standardized, high-ROI template for both cybercriminal and potentially advanced persistent threat (APT) groups.
To protect against these threats, security defenders should move beyond simple indicator blocking and prioritize aggressive behavioral hardening. Key recommendations include disabling the Windows Run dialog box via Group Policy Objects (GPO), implementing PowerShell Constrained Language Mode (CLM), and operationalizing Digital Risk Prevention tools such as Recorded Future’s Malicious Websites to identify and mitigate threats to your digital assets.
Based on increasing use since 2024, Insikt Group assesses that the ClickFix methodology will very likely remain a primary initial access vector throughout 2026 as threat actors continue to social engineer victims to enable exploitation. Looking ahead, Insikt Group anticipates ClickFix lures will become increasingly technically adaptive, incorporating more selective browser fingerprinting, while continuing to use infrastructure that can be built and dismantled quickly. In addition to technical refinements, Insikt Group predicts that the social engineering component will continue to evolve, leveraging new techniques to lure victims into executing malicious commands.
Key Findings
- Insikt Group identified and tracked five distinct ClickFix activity clusters exhibiting significant operational variance in lure themes and infrastructure patterns despite a shared reliance on fraudulent human-verification lures. This indicates that the ClickFix methodology has transitioned into a standardized, high-ROI template adopted across a fragmented ecosystem of threat actors.
- While visually diverse, all analyzed clusters use a consistent execution framework that bypasses traditional browser security controls by shifting the point of exploitation to user-assisted manual commands. These campaigns target a wide variety of sectors, including accounting (QuickBooks), travel (Booking.com), and system optimization (macOS).
- ClickFix technical execution follows a standardized four-stage pattern: input of highly encoded or fragmented strings, native execution via legitimate system shells living-off-the-land binaries (LOLBins), remote ingress from threat actor-controlled infrastructure, and immediate in-memory execution. This methodology allows threat actors to stage and run remote code with limited and short-lived forensic artifacts on the host system.
Background
First documented in late 2023, ClickFix has transitioned from a niche social engineering tactic to a cornerstone of the global cybercriminal ecosystem. ClickFix is a social engineering methodology that lures victims into manually executing malicious commands by masquerading as a necessary technical resolution for fabricated system errors or human-verification prompts. This technique represents an evolutionary shift from the FakeUpdates (SocGholish) model, prioritizing manual user intervention to evade the increasingly robust security features of modern web browsers and automated endpoint detection systems. In this context, the methodology embodies a “think smart, not hard” approach. The simplicity of relying on a manual user action makes it a potent defensive evasion tactic: bypassing typical browser-based security makes it difficult to detect, while the high number of threat actors using it makes it difficult to track across a fragmented threat landscape.
The technical core of the methodology relies primarily on pastejacking, where background JavaScript populates a victim’s clipboard with an obfuscated command while they are distracted by visual lures such as fraudulent reCAPTCHA or Cloudflare Turnstile overlays. In some instances, malicious commands are not automatically pasted into the victim’s clipboard, but rather, victims are manipulated into copying and running the command manually. By leveraging a living-off-the-land (LotL) approach, threat actors manipulate users into executing these commands directly within trusted system tools like the Windows Run dialog box, PowerShell, or the macOS Terminal. This user-assisted execution allows malicious scripts to execute silently and bypass traditional browser and endpoint security perimeters.
ClickFix has been weaponized by a diverse spectrum of threat actors, ranging from high-volume initial access brokers (IABs) to sophisticated state-sponsored groups such as BlueDelta (aka APT28) and the North Korean group PurpleBravo. The methodology enables a repeatable and scalable delivery framework capable of deploying a wide variety of secondary payloads, including infostealers like Lumma Stealer and Vidar, or remote access trojans (RATs) such as NetSupport RAT and Odyssey Stealer. These operations are frequently supported by highly adaptive, disposable infrastructure designed to maintain operational continuity even as individual domains are identified and blocked.
Technical Analysis
Insikt Group identified and tracked five emerging ClickFix clusters by leveraging the Recorded Future HTML Content Analysis dataset, which enables the systematic monitoring of embedded web artifacts. By pivoting on unique technical identifiers, including specific Document Object Model (DOM) hashes, hard-coded image source tags, and unique page titles, Insikt Group mapped ClickFix’s infrastructure and identified new malicious domains and infrastructure, facilitating the discovery of active domains and near real-time monitoring of cluster evolution.
Across the analyzed clusters, Insikt Group detailed the ClickFix commands victims were manipulated into executing on their systems. These commands relied heavily on LOLBins to achieve operational goals. By using LOLBins, threat actors leveraged native, legitimately signed executables to download malicious payloads to a victim’s machine. Depending on the security implementation of personal machines or corporate endpoints, this methodology can effectively evade standard detections and foundational security principles.
ClickFix Clusters
Insikt Group identified five clusters (see Figure 1) that exhibited significant operational variance despite a shared reliance on the ClickFix social engineering technique. These clusters were defined by their infrastructure patterns and targeting approaches, ranging from logistics-themed lures to dual-platform selection logic. This indicates that the ClickFix methodology is being deployed across a fragmented ecosystem of threat actors, each tailoring the technique to suit their own delivery requirements and victim profiles.
These clusters were grouped based on observable patterns in infrastructure reuse, lure formatting, platform targeting, and operational adjustments over time. While core technical elements and delivery mechanisms overlap, each cluster maintained a distinct footprint within the broader landscape. Insikt Group categorized the activity into the following five clusters:
- Intuit QuickBooks: Targeted impersonation of accounting software, often leveraging aged domains to bypass security filters
- Booking.com: Used fraudulent domains to present fake verification portals
- Birdeye: A large-scale cluster that lures users of the AI marketing company Birdeye by spoofing domains and manipulating victims to use a malicious command to deliver NetSupport RAT.
- Dual-Platform Selection: Used operating system detection to deliver platform-tailored lures and malware
- macOS Storage Cleaning: Used counterfeit prompts mimicking macOS system optimization to trick users into executing encoded terminal commands
Figure 1: Overview of ClickFix and associated clusters (Source: Recorded Future)
Cluster 1: Intuit QuickBooks
Cluster 1 was observed operating from January 2026 to the time of writing, primarily targeting organizations through social engineering lures impersonating the accounting software Intuit QuickBooks. QuickBooks is widely used for tax preparation in the United States; given the campaign’s active window coincides with the US tax season (typically January through April 15), Insikt Group assesses with moderate confidence that the timing was a calculated effort to target entities engaged in financial reporting. Although this cluster recently pivoted to targeting users of the US real estate marketplace Zillow, QuickBooks-related artifacts and brand-specific imagery remain deeply embedded throughout the Document Object Model (DOM) of the malicious landing pages.
Cluster 1 Profile
Figure 2: Overview of ClickFix Cluster 1 — Intuit QuickBooks (Source: Recorded Future)
Table 1: PowerShell commands observed across Cluster 1
Cluster 1 Infection Chain
The infection chain begins when a victim lands on a ClickFix landing page. The page presents a fraudulent human-verification interface (see Figure 3) that instructs the victim to complete specific “verification” steps.
Figure 3: Intuit QuickBooks-themed ClickFix page (Source: Recorded Future Web Scans)
By interacting with the page, the victim unknowingly copies a malicious command to their system clipboard. The technique often results in execution through native system utilities, such as Windows Run dialog and PowerShell, leveraging LOLBins to evade traditional browser and endpoint-based security controls.
Upon pasting the command, an obfuscated PowerShell script (Figure 4) executes in a hidden window. This stager uses self-referential function names to dynamically construct and invoke Invoke-RestMethod to the domain nobovcs[.]com.
Figure 4: Obfuscated PowerShell command executed in a hidden window, dynamically reconstructing and invoking code via iex (Source: Recorded Future)
This request triggers the retrieval of a short PowerShell stager (see Figure 5) that downloads a second-stage payload, bibi.php, saving it to the %TEMP% directory as script.ps1. This stager is the initial execution step that kicks off the NetSupport RAT installation.
Figure 5: Stager script to download second-stage script, bibi.php (Source: Recorded Future)
The bibi.php script is essential for the final deployment phase and for obfuscating on-disk artifacts. It contains a function called Get-RomanticName, which selects and combines strings from a thematic wordlist, including terms such as “Heart”, “Soul”, and “Desire”, to generate a randomized folder name under %LOCALAPPDATA%, where the staging files are placed.
The script retrieves four primary files from nobovcs[.]com, detailed in Table 2.
Filename
SHA-256
at.7z
c0af6e9d848ada3839811bf33eeb982e6c207e4c40010418e0185283cd5cff50
lnk.7z
5d821db386c7c879caeabf3e9f94c94a48eec6ec5a3a0efbae9d69da3f52c1db
7z.exe
43907e54cf3d1258f695d1112759b5457576481072cc76a679b8477cfeb3db87
7z.dll
b17c3e4058aacdcc36b18858d128d6b3058e0ea607a4dc59eb95b18b7c6acc7c
Table 2: Filenames and SHA256 hashes of the files downloaded from nobovcs[.]com (Source: Recorded Future)
The script uses 7z.exe to extract at.7z (protected by the password “pppp”), which contains the NetSupport RAT binary, neservice.exe. Persistence is established by hijacking Startup shortcuts; if no existing shortcut is detected, the script extracts lnk.7z to the Startup folder to ensure the payload launches automatically upon system reboot.
Following successful execution, the binary neservice.exe performs an HTTP GET request to gologpoint[.]com to initiate command-and-control (C2) communications. gologpoint[.]com resolves to the IP address 62[.]164[.]177[.]230.
Cluster 2: Booking.com
Cluster 2 was observed operating from February 2026 to the time of writing, impersonating the travel agency Booking.com. Insikt Group tracked the cluster by pivoting on a unique DOM hash made possible by the threat actor’s repeated use of a unique HTML title and consistent image files. Indicators of compromise (IoCs) tagged in this cluster can be seen in the Recorded Future HTML Content Analysis. The landing pages for this cluster use a counterfeit reCAPTCHA v2 challenge, requiring victims to select all photos containing a “bucket” (Figure 6). Insikt Group observed that the same challenge photos are presented in the same order across all analyzed pages.
Cluster 2 Profile
Figure 7: Overview of ClickFix Cluster 2 — Booking.com (Source: Recorded Future)
Table 3: PowerShell commands observed across Cluster 2
Cluster 2 Infection Chain
The process begins when a victim interacts with the fake challenge. Upon completing the challenge, the victim is redirected to a verification page where a malicious PowerShell command (see Figure 8) is copied to the system clipboard. Instructions on the verification page manipulate the victim into opening the Windows Run dialog box and entering the command. Executing this malicious command starts the infection chain for NetSupport RAT.
Figure 8: Command from the booking campaign that reaches out to the payload server (Source: Recorded Future)
The PowerShell command provided in script.ps1 (see Figure 9) executes with the -NoProfile and -ExecutionPolicy Bypass flags to evade standard logging and security restrictions. Following execution, the system pulls four staging files to a directory named DesireSpark Serenade. This directory naming convention is functionally identical to the “romantic” naming methodology observed in Cluster 1.
Figure 9: DOM file from checkpulse[.]com that details the command to be run on the victim machine, suppressing the protections normally in place to pull down the PowerShell command and execute it (Source: Recorded Future)
The primary staging mechanism relies on script.ps1 to pull secondary payloads from the staging server. In one analyzed instance, scripts originating from thestayreserve[.]com reached out to checkpulses[.]com to retrieve the files detailed in Table 4.
Filename
SHA-256
at.7z
397dcea810f733494dbe307c91286d08f87f64aebbee787706fe6561ed3e20f8
lnk.7z
5d821db386c7c879caeabf3e9f94c94a48eec6ec5a3a0efbae9d69da3f52c1db
7z.exe
43907e54cf3d1258f695d1112759b5457576481072cc76a679b8477cfeb3db87
7z.dll
b17c3e4058aacdcc36b18858d128d6b3058e0ea607a4dc59eb95b18b7c6acc7c
Table 4: Filenames and SHA256 hashes of the files downloaded from checkpulses[.]com (Source: Recorded Future)
The 7z.exe utility is used to extract at.7z, which contains the NetSupport RAT binary neservice.exe. Persistence is established by adding a link to the system Startup folder.
The domains observed across this cluster use a similar PowerShell command pattern. However, once the command is executed, the infection chain varies slightly with the staging infrastructure being called. In the cases of sign-in-op-token[.]com and the thestayreserve[.]com domains, the malicious command is identical in terms of pattern and organization, but the hard-coded dropper domain is bkng-updt[.]com and checkpulses[.]com, respectively.
While staging domains vary, the final payloads across this cluster converge on the same NetSupport RAT C2 infrastructure (Table 5).
Click Fix Domain
IP Address
Dropper
NetSupport RAT C2
sign-in-op-token[.]com
91[.]202[.]233[.]206
bkng-updt[.]com
77[.]91[.]65[.]144
hotelupdatesys[.]com
152[.]89[.]244[.]70
thestayreserve[.]com
91[.]202[.]233[.]206
checkpulses[.]com
77[.]91[.]65[.]31
chrm-srv[.]com
ms-scedg[.]com
152[.]89[.]244[.]70
Table 5: IoCs observed in the Booking.com infection chain (Source: Recorded Future)
Following installation, the malware from thestayreserve[.]com initiates communication (Figure 10) with chrm-srv[.]com and ms-scedg[.]com, both of which resolve to 152[.]89[.]244[.]70. The domain hotelupdatesys[.]com , resolves to the same IP address as the NetSupport RAT C2 for sign-in-op-token[.]com.
Figure 10: POST Request from sign-in-op-token[.]com showing NetSupport interaction (Source: Recorded Future)
Cluster 3: Birdeye
Cluster 3 was observed operating from May 2024 until the time of writing. Previously reported on by Insikt Group, this cluster uses infrastructure centered on domains incorporating the keyword “bird” to deliver its ClickFix lure pages, trackable in Recorded Future’s HTML Content Analysis. These lures spoof Birdeye, an AI marketing company, to manipulate victims into executing malicious commands.
Cluster 3 Profile
Figure 11: Overview of ClickFix Cluster 3 — Birdeye (Source: Recorded Future)
Table 6: PowerShell command observed across Cluster 3
Cluster 3 Infection Chain
The infection chain begins when a victim visits a compromised site and is presented with a Cloudflare-style CAPTCHA challenge. Upon interacting with the page, the victim is prompted to run a command in the Windows Run dialog box. Insikt Group identified this cluster by pivoting on unique technical identifiers within the HTML artifacts, including a consistent and unique page title and a static image used across the infrastructure.
The command the victim is manipulated into running causes the victim’s device to reach out to alababababa[.]cloud to download a payload from hxxps[://]alababababa[.]cloud/cVGvQio6[.]txt. To further reduce suspicion, once the malicious command is executed, the victim is redirected to the legitimate birdeye.com website (see Figure 12).
Figure 12: The redirect to the legitimate Birdeye website (Source: Recorded Future)
Analysis of the JavaScript within the DOM for this cluster, provided in Appendix F, revealed insights into the threat actor’s methods. A notable portion of the script uses seven obfuscated lines that are concatenated into a single string to be attached to the victim’s clipboard. The developer left comments within the code that detail the deobfuscated purpose of each line. For example, one comment explicitly identifies the portion of the command calling PowerShell with specific flags (Figure 13).
Figure 13: Portion of JavaScript containing threat actor comments (Source: Recorded Future)
Furthermore, a comment written in Cyrillic at the beginning of the script translates to, “This should help bypass Cloudflare static analysis”. This internal documentation suggests the threat actor is purposefully detailing their actions to refine bypass techniques against security scanners.
Historically, alababababa[.]cloud has been associated with the delivery of multiple malware strains, including Lumma Stealer and RedLine Stealer. The large volume of domains identified in this cluster, exceeding 40 unique entries, highlights the scale of the “run and repeat” model used to sustain this activity.
Cluster 4: Dual-Platform Selection
Cluster 4 was observed operating from March 2025 to the time of writing. This cluster is unique for its use of operating system detection to deliver tailored ClickFix lures for both Windows and macOS users. Unlike standard ClickFix behavior that typically pushes commands to the clipboard automatically, this variant provides detailed manual instructions, requiring the victim to open native system tools and manually copy and paste the provided staging payload. One of the ClickFix pages used to analyze this behavior was macosapp-apple[.]com, hosted at IP address 45[.]144[.]233[.]192.
Cluster 4 Profile
Figure 14: Overview of ClickFix Cluster 4 — Dual-Platform Selection (Source: Recorded Future)
Table 7: Encoded commands observed across Cluster 4
Cluster 4 Infection Chain
The infection chain begins when a victim lands on a ClickFix page that instructs them to verify they are human (Figure 15).
Figure 15: ClickFix page identified in Cluster 4 (Source: Recorded Future Web Scans)
Figure 23: Landing page for mac-os-helper[.]com (Source: Recorded Future)
Once the Terminal is open, the victim is prompted to execute a multi-stage command that purportedly “finds and removes temporary system files”.
In reality, these commands (see Table 9) use different encoding layers to hide their true intent; the first example decodes a hexadecimal string to reveal a Base64-encoded client URL (curl) instruction, while the second directly decodes a Base64 string to run an executable command. Both methods ultimately bypass simple pattern matching by obfuscating the malicious payload until execution.
Table 9: Encoded and obfuscated ClickFix commands for macOS (Source: Recorded Future)
As shown in Table 10, the revealed curl instruction uses a compound set of arguments, in this cluster, -kfsSL, to facilitate silent delivery. These flags ensure that Transport Layer Security (TLS) certificate checks are bypassed, server-side errors are suppressed, and the process remains hidden from the user’s view while following redirections to reach the final payload domain.
Table 10: Decoded and deobfuscated ClickFix commands for macOS (Source: Recorded Future)
Based on historic evidence (1, 2) and forensic patterns, Insikt Group assesses with high confidence that the information stealer MacSync was the primary payload used to infect victims in this cluster. The malicious commands on these pages caused the infected systems to reach out to a specific set of staging and C2 infrastructure, detailed in Table 11. Notably, while the domains varied, they were frequently observed behind Cloudflare to complicate network-level blocking.
Indicator
IP Address
ASN
First Seen
Last Seen
octopox[.]com
Cloudflare
Cloudflare
2026-02-06
2026-03-05
joeyapple[.]com
Cloudflare
Cloudflare
2026-02-04
2026-03-05
Table 11: C2 servers identified for the macOS cleaner campaign (Source: Recorded Future)
Copy Command Analysis
Insikt Group analyzed commands across the five clusters identified in this research. While the visual lures and impersonated brands vary between groups like Cluster 1 (Intuit QuickBooks) and Cluster 5 (macOS Storage Cleaning), the underlying execution logic remains consistent. This “run and repeat” methodology relies on a narrow set of trusted LOLBins and lightweight obfuscation to stage remote code with minimal forensic artifacts.
The technical implementation of ClickFix follows a standardized four-stage pattern across all target operating systems, as summarized in Table 12.
Stage
Action
Technical Intent
Obfuscated Input
Input of highly encoded or fragmented strings
Bypass static analysis and signature-based detection
Native Execution
Leveraging trusted system shells (zsh, bash, or powershell.exe)
Execute the initial stager using legitimate system binaries
Remote Ingress
Initiation of external requests to threat actor-controlled IPs or domains
Download secondary scripts or payloads from the staging infrastructure
In-Memory Execution
Piping downloaded content directly into an interpreter
Ensure no malicious files are initially saved to disk to evade endpoint security
Table 12: Standardized four-stage ClickFix execution pattern (Source: Recorded Future)
Insikt Group identified two primary command styles used in macOS-centric campaigns, such as Cluster 4 and Cluster 5, which are detailed in Table 13.
Technique
Observed Pattern
Defender Insight
Multi-Stage Encoding
Hex -> Base64 -> ZSH
The use of xxd -r -p in a user-initiated command is a significant indicator of malicious intent, as it is rarely used in legitimate troubleshooting.
Persistence and Backgrounding
Use of nohup and the & operator
This ensures the malicious process continues to run in the background even after the user closes the terminal, providing persistence during staging.
Table 13: Observed tactics, techniques, and procedures (TTPs) for macOS and Linux (zsh and bash) commands (Source: Recorded Future)
Windows-based commands, particularly those observed in Cluster 1 and Cluster 2, exhibit a higher degree of sophistication through “Command Swizzling” and case randomization, as shown in Table 14.
Technique
Observed Pattern
Defender Insight
Parameter Obfuscation
Randomized casing and shortened aliases (for example, -wINDoW MiNI, -wi mi, or -w h)
Threat actors use these to evade security tools looking for literal strings like “Hidden” or “Minimized”.
The “Golden” Pattern
Combining Invoke-RestMethod (irm) with Invoke-Expression (iex)
This allows for the seamless retrieval and execution of remote code entirely in memory. This combination is a high-fidelity hunt for ClickFix activity.
String Manipulation Deception
Using .Substring() or .Replace() to “build” commands
Clusters like Cluster 1 avoid explicitly typing iex to bypass static signature detections.
Table 14: Observed TTPs for Windows (PowerShell) commands (Source: Recorded Future)
Mitigations
To mitigate the threats posed by ClickFix social engineering and related living-off-the-land (LotL) techniques, Insikt Group recommends a defense-in-depth approach that combines proactive intelligence monitoring with aggressive hardening of native system utilities.
- Operationalize HTML Content Analysis: Recorded Future customers should use the HTML Content Analysis source to monitor for impersonations of their brand, which are leveraged to deliver ClickFix. Leverage the Recorded Future Intelligence Operations Platform to monitor for unique web artifacts, such as specific Document Object Model (DOM) hashes and page titles, to identify new ClickFix domains in real time.
- Use Recorded Future Threat Intelligence: Recorded Future customers can proactively mitigate this threat by operationalizing Recorded Future Intelligence Operations Platform data, specifically by leveraging continuously updated Risk Lists and by blocklisting IP addresses and domains associated with ClickFix to block communication with malicious infrastructure.
- Monitor Malicious Infrastructure Risk Lists: Continuously update security information and event management (SIEM) and endpoint detection and response (EDR) tools with Recorded Future Risk Lists to block traffic to identified staging and command-and-control (C2) domains.
- Use Malware Intelligence: Leverage the Recorded Future Intelligence Operations Platform to hunt for indicators of compromise (IoCs) associated with payloads identified in this report, such as NetSupport RAT, Odyssey Stealer, and Lumma Stealer.
- Leverage Network Intelligence: Use Recorded Future Network Intelligence to detect exfiltration events early (such as those linked to NetSupport RAT), which can help prevent intrusions before they escalate. This approach relies on comprehensive, proactive infrastructure discovery provided by Insikt Group and the analysis of vast amounts of network traffic.
- Use Identity Module: Recorded Future customers should leverage the Identity Module to monitor for credentials and passwords being sold on the dark web that have been stolen by information stealers.
- Disable Windows Run Dialog via Group Policy Objects (GPOs): For corporate environments, disable the
Win+Rkeyboard shortcut and the Run command in the Start menu via Group Policy Objects (GPOs). This significantly hinders the ClickFix execution chain, as victims are typically instructed to paste malicious commands directly into this dialog box. - Restrict Terminal and PowerShell Execution: Implement PowerShell Constrained Language Mode (CLM) and use AppLocker or Windows Defender Application Control (WDAC) to prevent the execution of unassigned scripts and the misuse of living-off-the-land binaries (LOLBins). On macOS, restrict Terminal and other shell interpreters (for example,
zshandbash) using application control policies enforced via mobile device management (MDM), and leverage System Integrity Protection (SIP) and endpoint security controls to limit unauthorized script execution and abuse of native command-line utilities. - User Awareness and Training: Conduct targeted social engineering simulations that specifically educate users on the dangers of “manual verification” prompts that require copying and pasting commands into system utilities.
Outlook
The identification of five parallel operational clusters targeting diverse sectors, including accounting, travel, real estate, and legal services, indicates that the ClickFix methodology has transitioned from a niche technique to a standardized template within the cybercriminal ecosystem. This standardized “run and repeat” model is facilitating broader adoption by both lower-tier “traffers” and sophisticated advanced persistent threat (APT) groups. Threat actors are able to maintain operational continuity even when individual domains are blocked due to the availability of disposable infrastructure and shared technical templates.
Insikt Group assesses with high confidence that the ClickFix methodology will very likely remain a heavily used initial access vector throughout 2026. The continued success of ClickFix is driven by its ability to bypass advanced browser-based security controls by shifting the point of exploitation to user-assisted manual actions. As long as native system utilities such as PowerShell and Terminal remain accessible to end-users, ClickFix will continue to offer threat actors a high-return, low-complexity alternative to traditional exploit kits.
Looking ahead, ClickFix lures will likely become increasingly technically adaptive. Future iterations are expected to incorporate more granular browser fingerprinting to conditionally serve payloads based on a victim’s hardware, geographic location, or organizational profile. Furthermore, since threat actors are already purposefully documenting bypass techniques for static analysis engines within their code, Insikt Group anticipates a long-term trend toward more resilient and obfuscated staging environments. This convergence of sophisticated social engineering and LotL techniques necessitates a shift in defensive strategy, moving away from simple indicator blocking toward aggressive behavioral hardening of the system utilities that ClickFix relies upon.
Appendix A: Indicators of Compromise
Appendix B: Cluster 1 — Intuit QuickBooks Indicators
Domain
IP Address
ASN/AS
First Seen
Last Seen
mrinmay[.]net
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-21
2026-03-05
guypinions[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-20
2026-02-25
4freepics[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-20
2026-02-24
ariciversontile[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-20
2026-02-25
quiptly[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-20
2026-02-25
anthonydee[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-20
2026-02-26
ned.coveney-ltd[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2025-10-10
2025-11-20
grandmastertraders[.]traderslinkfx[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2025-12-01
2026-02-24
nhacaired88[.]com
193[.]58[.]122[.]97
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-10
2026-03-05
elive777a[.]com
94[.]156[.]112[.]115
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-02
2026-03-05
fomomforhealth[.]com
94[.]156[.]112[.]115
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-02
2026-03-05
suedfactoring[.]it[.]com
45[.]93[.]20[.]141
Chang Way Technologies Co. Limited (AS57523)
2026-01-30
2026-02-09
shopifyservercloud[.]com
45[.]93[.]20[.]50
Chang Way Technologies Co. Limited (AS57523)
2026-01-10
2026-03-05
elive123go[.]com
45[.]93[.]20[.]50
Chang Way Technologies Co. Limited (AS57523)
2026-01-09
2026-03-05
hostmaster[.]extracareliving[.]com
45[.]93[.]20[.]50
Chang Way Technologies Co. Limited (AS57523)
2026-01-25
2026-03-05
orkneygateway[.]com
45[.]93[.]20[.]50
Chang Way Technologies Co. Limited (AS57523)
2025-12-14
2026-03-05
ustazazharidrus[.]com
87[.]236[.]16[.]20
Beget LLC (AS198610)
2026-02-02
2026-03-05
45[.]93[.]20[.]50
Chang Way Technologies Co. Limited (AS57523)
2026-01-09
2026-02-01
deinhealthcoach[.]com
193[.]222[.]99[.]212
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-16
2026-03-05
bancatangcode[.]com
193[.]222[.]99[.]212
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-16
2026-03-05
billiardinstitute[.]com
193[.]58[.]122[.]97
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-10
2026-03-05
yvngvualr[.]com
Cloudflare
Cloudflare
2025-04-06
2026-03-05
visitbundala[.]com
Cloudflare
Cloudflare
2025-03-10
2026-03-05
surecomforts[.]com
45[.]93[.]20[.]50
Chang Way Technologies Co. Limited (AS57523)
2026-01-09
2026-03-05
theinvestworthy[.]com
45[.]93[.]20[.]50
Chang Way Technologies Co. Limited (AS57523)
2025-12-13
2026-03-05
customblindinstall[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-21
2026-03-05
extracareliving[.]com
45[.]93[.]20[.]50
Chang Way Technologies Co. Limited (AS57523)
2025-12-14
2026-03-05
subsgod[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-21
2026-03-05
traderslinkfx[.]com
193[.]35[.]17[.]12
PLAY2GO INTERNATIONAL LIMITED (AS215439)
2026-02-21
2026-03-05
Appendix C: bibi.php Script
Indicator
IP Address
ASN
First Seen
Last Seen
sign-in-op-token[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-03-01
2026-03-03
thestayreserve[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-23
2026-02-24
accountpulse[.]help
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-16
2026-03-05
admin-activitycheck[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-22
2026-02-27
accountmime[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-21
2026-02-24
checkhelpdesk[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-18
2026-02-23
thepulseactivity[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-18
2026-02-23
checkaccountactivity[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-17
2026-02-23
account-helpdesk[.]top
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-15
2026-02-18
pulse-help-desk[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-13
2026-02-19
account-helpdesk[.]icu
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-10
2026-03-02
account-helpdesk[.]info
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-08
2026-02-11
helpdeskpulse[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-06
2026-02-09
account-help[.]info
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-08
2026-03-05
acconthelpdesk[.]com
91[.]202[.]233[.]206
Prospero (AS200593)
2026-02-05
2026-03-03
Appendix E: Cluster 3 — Birdeye Indicators
Indicator
IP Address
ASN
First Seen
Last Seen
acebirdrep[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
bebirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrankbox[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrankfx[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrankgo[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrankinc[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrankllc[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrankmax[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdranktip[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrankup[.]com
Cloudflare
Cloudflare
2024-05-17
2026-03-05
birdrankus[.]com
Cloudflare
Cloudflare
2024-05-17
2026-03-05
birdrankusa[.]com
Cloudflare
Cloudflare
2024-05-16
2024-05-16
birdrankvip[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrankzen[.]com
Cloudflare
Cloudflare
2024-05-17
2026-03-05
birdrepbiz[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrepgo[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrephelp[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdreplab[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrepsys[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrepusa[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
birdrepuse[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
bitbirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
bitbirdrep[.]com
Cloudflare
Cloudflare
2024-05-17
2026-03-05
fixbirdrank[.]com
Cloudflare
Cloudflare
2024-05-17
2026-03-05
getbirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
gobirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
helpbirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
helpbirdrep[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
infobirdrep[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
justbirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
mybirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
nowbirdrank[.]com
Cloudflare
Cloudflare
2024-05-17
2026-03-05
optbirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
probirdrep[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
topbirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
topbirdrep[.]com
Cloudflare
Cloudflare
2024-05-17
2026-03-05
usbirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2024-05-16
usebirdrep[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
vipbirdrank[.]com
Cloudflare
Cloudflare
2024-05-16
2026-03-05
Appendix F: Birdeye Cluster Javascript
Appendix G: Cluster 4 — Dual-Platform Selection Indicators
Indicator
IP Address
ASN
First Seen
Last Seen
valetfortesla[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-11-12
2026-03-05
macxapp[.]org
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-18
2025-06-18
apposx[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-13
2025-06-24
cryptonews-info[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-18
2025-12-20
macosx-app[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-14
2025-06-16
cryptoinfnews[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-14
2025-06-30
macxapp[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-14
2025-06-16
cryptoinfo-allnews[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-13
2025-06-30
appxmacos[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-13
2025-06-30
appmacintosh[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-12
2025-06-13
macosxappstore[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-09
2025-06-30
macosx-apps[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-09
2025-06-11
cryptoinfo-news[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-06-08
2025-06-29
financementure[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-05-27
2025-06-30
appsmacosx[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-05-27
2025-06-09
appmacosx[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-05-27
2025-06-14
macosxapp[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-05-27
2025-06-09
macosapp-apple[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-05-25
2025-05-26
macapps-apple[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-05-23
2025-05-24
macapp-apple[.]com
45[.]144[.]233[.]192
Baykov Ilya Sergeevich
(AS41745)
2025-05-13
2025-05-23
The Legal Cyber Brief — monthly cyber intelligence for law firm leaders. Threats, regulatory shifts, and practical tools from the field. No fluff.
The Legal Cyber Brief — monthly cyber intelligence for law firm leaders.