ClickFix phishing campaign deploys Havok post-exploitation framework for remote access

ClickFix phishing campaign deploys Havok post-exploitation framework for remote access

Cybersecurity researchers have uncovered a new phishing campaign, called ClickFix, which uses social engineering tactics to deliver malware and grant attackers remote access to compromised devices. Discovered by Fortinet’s Fortiguard Labs, the campaign deploys the Havok post-exploitation framework, allowing attackers to control infected systems.

ClickFix, a tactic that surfaced last year, involves fake error messages that trick victims into running malicious PowerShell commands. In the observed campaign, attackers send phishing emails with a "restricted notice" and a 'Documents.html' attachment.

When opened, the HTML file shows a fake error message about a failed OneDrive connection, urging the user to update the DNS cache. Clicking the "How to fix" button copies a malicious PowerShell command to the clipboard, which, when pasted into a command prompt, executes a script hosted on a SharePoint server.

The script checks if the system is in a sandbox, avoiding detection if found. If not, it alters the Windows Registry and installs Python if necessary. The script then downloads and installs the Havok framework, allowing attackers to control the system and move laterally within the network.

Havok communicates with the attacker’s infrastructure through Microsoft’s Graph API, disguising malicious traffic as legitimate cloud service communications.


Back to the list

Latest Posts

Cyber Security Week in Review: July 4, 2025

Cyber Security Week in Review: July 4, 2025

In brief: Google patches Chrome 0Day, the US is on the hunt for North Korean IT workers, and more.
4 July 2025
AI chatbots fall for phishing scams

AI chatbots fall for phishing scams

The models provided the correct URL only 66% of the time; nearly 30% of responses pointed users to dead or suspended domains.
3 July 2025
Chinese hackers exploited Ivanti flaws in attacks against French government

Chinese hackers exploited Ivanti flaws in attacks against French government

ANSSI believes that the Houken campaign is operated by ‘UNC5174’, an entity believed to act as an initial access broker for China’s Ministry of State Security.
2 July 2025