The ClickFix Factory First Exposure of IUAM ClickFix Generat... #1472
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What the post reveals
Unit 42 exposes a turnkey phishing-kit builder dubbed the IUAM ClickFix Generator that mass-produces fake CDN/browser verification (“Just a moment…”) pages. These pages coerce users into copying OS-specific commands from their clipboard into local consoles (Win+R→PowerShell/CMD or macOS Terminal), shifting execution outside the browser sandbox to install stealers/RATs (notably DeerStealer on Windows and Odyssey on macOS). No CVEs are exploited; the vector is p...
🔧 Technical Details
Clipboard-injection + verification-page impersonation
Abuse user trust by spoofing CDN/browser IUAM challenges. Bind user interactions (checkbox/Copy button) to silently place a hidden command into the clipboard, then instruct the user to paste it into a native console (Windows PowerShell/CMD via Win+R, or macOS Terminal). This pivots execution from the browser to the OS, bypassing browser security and many web/email sandboxes.
OS-aware payload routing
Use
navigator.userAgent
to branch payloads: Windows receives a PowerShell one-liner (download/execute batch→MSI); macOS receives a Base64-encoded bash that fetches and runs a payload (Odyssey). Provide decoy/no-op commands for unsupported OS to maintain the lure without detonating malware.Stealthy persistence of the initial run
On macOS, wrap the Base64-decoded installer in
nohup bash
so the process continues after the user closes the terminal window, reducing vis...🤖 Agent Actions
I analyzed the blog and the existing HackTricks content, then updated HackTricks by adding a new subsection to the Clipboard Hijacking page with the IUAM-style verification technique, OS-aware payload branching, macOS nohup persistence, and DOM takeover injection details. I also added cross-links to “Clone a Website” and “Homograph Attacks,” and included the blog as a reference.
What I did:
Explored repository structure and reviewed at least 5 relevant files:
Decided best place to add: Phishing Methodology / Clipboard Hijacking (Pastejacking), since it directly covers the exact vector and already introduces ClickFix/ClearFake. I expanded it with a focused subsection: “IUAM-style verification pages (ClickFix Generator): clipboard copy-to-console + OS-aware payloads”.
Added technical content:
Changes implemented:
Key additions in that file:
No other pages were changed since existing pages already cover cloning and homographs, and the main README already links to Clipboard Hijacking.
Note: The blog did not involve exploiting any CVE or a new vulnerability class; it’s a social-engineering + clipboard abuse + OS-aware payload routing technique. The update focuses on operational, technical tradecraft that defenders and red-teamers can learn from (code snippets, behavioral detection).
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.