[ newsletter ]
Stay ahead of Web3 threats—subscribe to our newsletter for the latest in blockchain security insights and updates.
Thank you! Your submission has been received!
Oops! Something went wrong. Please try again.
Learn about the new ClickFix tactic used by cybercriminals to deliver infostealers through fake Google Meet pages, posing a significant threat to users.
Users of Google Meet are facing a new cybersecurity threat as cybercriminals deploy fake video conference pages to deliver information-stealing malware. This tactic, known as ClickFix, tricks users into downloading malicious software without their knowledge, bypassing traditional web browser security measures.
The ClickFix tactic has emerged as a popular method among cybercriminals, posing significant risks to both consumers and businesses. Users typically arrive at these compromised sites through phishing emails or search engine results. Once on the site, they encounter fake alerts that prompt them to click a “Fix It” button, leading to the unintentional execution of malware.
The ClickFix tactic has been tailored to target various groups, including:
Sekoia researchers have linked the ClickFix campaigns impersonating Google Meet to two cybercrime groups associated with cryptocurrency scams. The malware delivered includes:
Once the malware is installed, it sends a notification to the attackers via Telegram, allowing them to track compromised devices.
The rise of the ClickFix tactic highlights the need for increased vigilance among users. Here are some recommendations to protect against such threats:
As cybercriminals continue to evolve their tactics, users must remain vigilant against threats like the ClickFix tactic. By understanding how these attacks work and taking proactive measures, individuals and organizations can better protect themselves from falling victim to such schemes.