Phishing Frenzy: Cyber Tricksters Use ClickFix to Unleash Havoc on Unsuspecting Users
Phishing campaigns now use the cunning ClickFix technique to hide malware behind SharePoint sites. The ploy tricks users into executing a malicious PowerShell command, with the Havoc Demon agent lurking in the shadows. Remember, if a SharePoint site looks too friendly, it might just be phishing for trouble!

Hot Take:
In the world of cyber shenanigans, it seems like the bad guys never take a coffee break! This time, they’re using SharePoint and the Microsoft Graph API to turn an innocent-sounding “Documents.html” into a high-stakes game of “Guess what malware’s in the box!” It’s like a cybersecurity version of those Russian nesting dolls, except this one could mess up your day. Let’s dive in before they hack the WiFi at your local coffee shop!
Key Points:
- Cybercriminals are using the ClickFix technique to deliver a C2 framework called Havoc.
- The attack starts with a phishing email containing an HTML attachment that tricks users into executing malicious commands.
- Malware stages are hidden behind a SharePoint site, utilizing the Microsoft Graph API to obscure communications.
- The framework supports operations such as information gathering, file operations, and Kerberos attacks.
- Malwarebytes highlights ongoing exploitation of Google Ads policies to target PayPal users with fake ads.
Already a member? Log in here