Code Defence Cyber security

Darktrace Warning: North Korean Hackers Using “ClickFix” to Bypass EDR

A new threat report released today by Darktrace highlights a surge in “ClickFix” social engineering attacks, particularly by North Korean groups (Lazarus). This tactic involves tricking users (often IT staff or devs) into copying and pasting malicious PowerShell scripts to “fix” a fake error on a website or video conference.

Business Impact

This technique is highly effective because it bypasses standard malware detection. The user is manually executing the malicious command, which EDR tools often interpret as legitimate administrative activity. It grants attackers immediate, stealthy access to endpoints.

Why It Happened

Attackers are adapting to improved email defenses by moving attacks to the browser and exploiting the “human gap.” The technique leverages the clipboard, which is difficult for security tools to inspect in real-time.

Recommended Executive Action

Update security awareness training to specifically cover “ClickFix” and “clipboard injection” attacks. Restrict the ability for standard users to execute PowerShell scripts and consider browser extensions that block pasting of code into the terminal.

Hashtags: #SocialEngineering #ClickFix #Lazarus #NorthKorea #APT #CyberSecurity #InfoSec #PowerShell

Scroll to Top

Review My Order

0

Subtotal