Unveiling Fake CAPTCHA ClickFix Attacks
Analysis of the ClickFix social engineering technique where fake CAPTCHAs trick users into executing malicious PowerShell commands via clipboard hijacking.
Originally published on the Splunk Security Blog
Read the full article: Unveiling Fake CAPTCHA ClickFix Attacks
The Deceptively Simple Attack
ClickFix is brilliantly evil. It combines social engineering with clipboard manipulation to trick users into executing malicious commands themselves.
How It Works
- User visits malicious site - Often via malvertising or phishing
- Fake CAPTCHA appears - “Verify you’re human”
- Instructions displayed - “Press Win+R, then Ctrl+V, then Enter”
- Malicious payload executes - User unknowingly runs attacker’s code
The genius? The user voluntarily runs the command. No exploit needed.
What’s on the Clipboard?
Typically a PowerShell one-liner:
powershell -w hidden -e JABjAGwAaQBlAG4AdAAgAD0AIABOAGUAdwAtAE8A...
This downloads and executes the real payload—info stealers, RATs, or ransomware loaders.
Detection Strategies
Clipboard-to-PowerShell Pattern
index=sysmon EventCode=1
Image="*\\powershell.exe"
ParentImage="*\\explorer.exe"
CommandLine="*-e*" OR CommandLine="*-enc*"
| table _time, Computer, User, CommandLine
Run Dialog Spawning PowerShell
| tstats count FROM datamodel=Endpoint.Processes
WHERE Processes.parent_process_name="explorer.exe"
AND Processes.process_name="powershell.exe"
ClickGrab Tool
I built ClickGrab to help defenders test and detect these attacks safely.
Read the full breakdown: Unveiling Fake CAPTCHA ClickFix Attacks
Related Modules
ClickGrab
Finding ClickFix and FakeCAPTCHA like it's 1999. Detection and hunting tools for clipboard hijacking attacks.