{"id":2678,"date":"2026-04-22T15:36:36","date_gmt":"2026-04-22T19:36:36","guid":{"rendered":"https:\/\/www.yorku.ca\/uit\/infosec\/?p=2678"},"modified":"2026-04-22T15:42:56","modified_gmt":"2026-04-22T19:42:56","slug":"fake-captcha-real-threat-clickfix-social-engineering-attacks","status":"publish","type":"post","link":"https:\/\/www.yorku.ca\/uit\/infosec\/2026\/04\/22\/fake-captcha-real-threat-clickfix-social-engineering-attacks\/","title":{"rendered":"Fake CAPTCHA, Real Threat: ClickFix Social Engineering Attacks"},"content":{"rendered":"\n
ClickFix attacks are a rapidly evolving threat that use fake CAPTCHA pages to trick people into running malicious commands (often PowerShell) on their own devices. In every ClickFix case, the attacker relies on one thing: your participation. Most traditional phishing attempts and malicious sites are filtered or blocked long before they reach you. That\u2019s why ClickFix pushes you to take extra steps yourself. By convincing you to run a command, the attacker gets past the protections already set in place and installs malware that would otherwise be detected.<\/p>\n\n\n\n
ClickFix is a social engineering technique where attackers compromise legitimate websites and replace normal verification steps such as CAPTCHAs with fake prompts, and instruct users to run malicious commands on their computers. These commands often involve opening the Windows Run dialog or PowerShell and pasting in a script that appears to \u201cfix\u201d a problem or \u201cverify\u201d the user. In reality, the script is being used to download malware that compromises your device.<\/p>\n\n\n\n