veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

294
active users

#clickfix

1 post1 participant0 posts today
TechNadu<p>🚨 ClickFix fake CAPTCHA malware has leveled up — no more downloads, just stealthy script-based payloads.</p><p>🧩 macOS, Linux, and Windows users are now targets.<br>💥 Obfuscated commands<br>💻 Trusted domains like Google Scripts🎯 Latest lure: Fake Booking login via CAPTCHA</p><p>🧵 Breaks down social engineering + cross-platform payloads:⬇️<br><a href="https://www.technadu.com/clickfix-fake-captcha-campaigns-show-enhanced-cross-platform-tactics-targeting-macos-and-linux/605376/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">technadu.com/clickfix-fake-cap</span><span class="invisible">tcha-campaigns-show-enhanced-cross-platform-tactics-targeting-macos-and-linux/605376/</span></a></p><p><a href="https://infosec.exchange/tags/clickfix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>clickfix</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> <a href="https://infosec.exchange/tags/LinuX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuX</span></a> <a href="https://infosec.exchange/tags/InfoStealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoStealer</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/CAPTCHA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CAPTCHA</span></a></p>
nemo™ 🇺🇦<p>🚨 New social engineering alert: <a href="https://mas.to/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> tricks users into pasting malicious code from the browser clipboard into their device terminal, leading to malware like RATs and stealers. Stay vigilant and protect your browser! 🛡️🔐 Read more: <a href="https://www.bleepingcomputer.com/news/security/inside-a-real-clickfix-attack-how-this-social-engineering-hack-unfolds/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/inside-a-real-clickfix-attack-how-this-social-engineering-hack-unfolds/</span></a> <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://mas.to/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
Anna Wasilewska-Śpioch<p>🇵🇱 Szczegółowa analiza techniczna nowej kampanii ukierunkowanych ataków wykorzystujących metodę <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> w celu dostarczenia złośliwego oprogramowania, przygotowana przez Irka Tarnowskiego, który swego czasu napisał sporo dobrych tekstów do <span class="h-card" translate="no"><a href="https://infosec.exchange/@zaufanatrzeciastrona" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>zaufanatrzeciastrona</span></a></span> </p><p>🇬🇧 A detailed technical analysis of a new campaign of targeted attacks using the ClickFix method to deliver malware </p><p><a href="https://medium.com/@ireneusz.tarnowski/dissecting-the-clickfix-user-execution-attack-and-its-sophisticated-persistence-via-ads-54435da7176b" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@ireneusz.tarnowski</span><span class="invisible">/dissecting-the-clickfix-user-execution-attack-and-its-sophisticated-persistence-via-ads-54435da7176b</span></a></p>
ESET Research<p><a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> went from virtually non-existent to the second most common attack vector blocked by <a href="https://infosec.exchange/tags/ESET" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESET</span></a>, surpassed only by <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a>. This novel social engineering technique accounted for nearly 8% of all detections in H1 2025. <a href="https://infosec.exchange/tags/ESETresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESETresearch</span></a><br>ClickFix lures users by displaying bogus error messages followed by quick fix instructions, including copy-pasting malicious code. Running the code in the victim’s command line interpreter delivers malware such as <a href="https://infosec.exchange/tags/RATs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RATs</span></a>, infostealers, and cryptominers.<br>Between H2 2024 and H1 2025, ESET’s detection for ClickFix, HTML/FakeCaptcha, skyrocketed by 517%. Most detections in ESET telemetry were reported from Japan (23%), Peru (6%), and Poland, Spain, and Slovakia (&gt;5% each).<br>What makes <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> so effective? The fake error message looks convincing; instructions are simple, yet the copied command is too technical for most users to understand. Pasting it into cmd leads to compromise with final payloads, including <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> or <a href="https://infosec.exchange/tags/LummaStealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LummaStealer</span></a>. <br>While <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> was introduced by cybercriminals, it’s since been adopted by APT groups: Kimsuky, Lazarus; Callisto, Sednit; MuddyWater; APT36. NK-aligned actors used it to target developers, steal crypto and passwords from Metamask and <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> Keychain. <br><a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> uses psychological manipulation by presenting fake issues and offering quick solutions, which makes it dangerously efficient. It appears in many forms – error popups, email attachments, fake reCAPTCHAs – highlighting the need for greater vigilance online.<br>Read more in the <a href="https://infosec.exchange/tags/ESETThreatReport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESETThreatReport</span></a>:<br>🔗 <a href="https://welivesecurity.com/en/eset-research/eset-threat-report-h1-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">welivesecurity.com/en/eset-res</span><span class="invisible">earch/eset-threat-report-h1-2025</span></a></p>
Randy<p><span class="h-card" translate="no"><a href="https://abyssdomain.expert/@filippo" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>filippo</span></a></span> the copy/paste technique is called <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> . the site in the image is infected by TA2726's Keitaro which is well known for sending Windows folks to <a href="https://infosec.exchange/tags/SocGholish" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocGholish</span></a> . what they do with macOS folks has changed over the years. i see they sent you to something that delivered what looks like Poseidon Stealer.</p><p><a href="https://medium.com/@MateoPappa/letsdefend-poseidon-macos-stealer-hard-a796c85d8c72" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@MateoPappa/letsdef</span><span class="invisible">end-poseidon-macos-stealer-hard-a796c85d8c72</span></a></p>
Brad<p>2025-07-15 (Tuesday): Tracking <a href="https://infosec.exchange/tags/SmartApeSG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmartApeSG</span></a> </p><p>The SmartApeSG script injected into page from compromised website leads to <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> style fake verification page. ClickFix-ing you way through this leads to a <a href="https://infosec.exchange/tags/NetSupportRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetSupportRAT</span></a> infection.</p><p>Compromised site (same as yesterday): </p><p>- medthermography[.]com</p><p>URLs for ClickFix style fake verification page:</p><p>- warpdrive[.]top/jjj/include.js<br>- warpdrive[.]top/jjj/index.php?W11WzmLj<br>- warpdrive[.]top/jjj/buffer.js?409a8bdbd9</p><p>Running the script for NetSupport RAT:</p><p>- sos-atlanta[.]com/lal.ps1<br>- sos-atlanta[.]com/lotu.zip?l=4773</p><p><a href="https://infosec.exchange/tags/NetSupport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetSupport</span></a> RAT server (same as yesterday):</p><p>- 185.163.45[.]87:443</p>
ℒӱḏɩę :blahaj: 💾<p>I finally stumbled upon a real <a href="https://tech.lgbt/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> attack in the wild. My favorite weather page presented the screen as shown. It doesn't take much tech knowledge to know these instructions are pure bullshit.</p><p>Now here's what's interesting. I reloaded the page, normal page came up. Cleared the cookies, normal page. Tried a different browser, normal page. So is it random? Should I alert the site owner?</p><p><a href="https://tech.lgbt/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://tech.lgbt/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://tech.lgbt/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://tech.lgbt/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://tech.lgbt/tags/cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudflare</span></a></p>
Brad<p>2025-07-14 (Monday): <a href="https://infosec.exchange/tags/SmartApeSG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmartApeSG</span></a> script injected into page from compromised website leads to <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> style fake verification page. ClickFix-ing you way through this leads to a <a href="https://infosec.exchange/tags/NetSupportRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetSupportRAT</span></a> infection.</p><p>Compromised site: </p><p>- medthermography[.]com</p><p>URLs for ClickFix style fake verification page:</p><p>- lebensversicherungvergleich[.]top/jjj/include.js<br>- lebensversicherungvergleich[.]top/jjj/index.php?OtKXgPVX<br>- lebensversicherungvergleich[.]top/jjj/buffer.js?4261984971</p><p>Running the script for NetSupport RAT:</p><p>- affordableasphalt-paving[.]com/lal.ps1<br>- affordableasphalt-paving[.]com/lotu.zip?l=3526</p><p><a href="https://infosec.exchange/tags/NetSupport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetSupport</span></a> RAT server:</p><p>- 185.163.45[.]87:443</p>
Brad<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@badsamurai" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>badsamurai</span></a></span> That's basically my point. <a href="https://infosec.exchange/tags/FileFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FileFix</span></a> is just <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> by another name. Trying to separate the two doesn't make sense to me.</p><p>Definitely agree that your mitigation is a good way to help combat this.</p>
Brad<p><a href="https://infosec.exchange/tags/Example" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Example</span></a> 3: <a href="https://infosec.exchange/tags/TermFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TermFix</span></a> </p><p>I rarely see this, and I haven't yet personally documented it. So I found an image from a Google search to illustrate.</p><p>This example is from a <a href="https://infosec.exchange/tags/TermFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TermFix</span></a> style <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> popup asking the viewer to open a PowerShell terminal.</p>
Brad<p>Example 2: <a href="https://infosec.exchange/tags/FileFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FileFix</span></a> </p><p>As of 2025-07-03, the <a href="https://infosec.exchange/tags/KongTuke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KongTuke</span></a> campaign is using FileFix style <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> pages to distribute whatever this campaign is distributing. </p><p>It's likely pushing <a href="https://infosec.exchange/tags/InterlockRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InterlockRAT</span></a> based on previous discussions I've had here, but I couldn't confirm, because it didn't like me.</p>
Brad<p>Example 1: <a href="https://infosec.exchange/tags/RunFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RunFix</span></a></p><p>As of 2025-07-03, the <a href="https://infosec.exchange/tags/SmartApeSG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmartApeSG</span></a> campaign is using RunFix style <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> pages to distribute <a href="https://infosec.exchange/tags/NetSupportRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetSupportRAT</span></a></p>
Brad<p><a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> is a social engineering technique that uses fake verification pages and clipboard hijacking to convince people to click and keyboard stroke their way to an infection. So let's categorize <a href="https://infosec.exchange/tags/FileFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FileFix</span></a> properly in the pantheon of ClickFix Attacks.</p><p>FileFix: A ClickFix page that asks you to past script into a File Manager window.</p><p><a href="https://infosec.exchange/tags/RunFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RunFix</span></a>: A ClickFix page that asks you to paste script into a Run window</p><p><a href="https://infosec.exchange/tags/TermFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TermFix</span></a>: A ClickFix page that asks you to paste script into a terminal window (cmd.exe console or PowerShell terminal).</p><p>We cool with that? Any others types I'm missing?</p>
Bill<p>Are we still on about the MotW flaws? I'm not sure anyone pays attention to that anyway.</p><p><a href="https://www.darkreading.com/endpoint-security/clickfix-spin-off-bypassing-key-browser-safeguards" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/endpoint-secur</span><span class="invisible">ity/clickfix-spin-off-bypassing-key-browser-safeguards</span></a></p><p><a href="https://infosec.exchange/tags/clickfix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>clickfix</span></a> <a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a></p>
Brad<p>2025-06-27 (Friday): <a href="https://infosec.exchange/tags/SmartApeSG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmartApeSG</span></a> infection chain leading to <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> lure leading to <a href="https://infosec.exchange/tags/NetSupportRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetSupportRAT</span></a></p><p>URL sequence leading to ClickFix:</p><p>- palcomp3[.]top/sss/buf.js<br>- palcomp3[.]top/sss/index.php?GQX1KqUM<br>- palcomp3[.]top/sss/bof.js?19ec2a189848bc0bfa</p><p>URL sequence after running ClickFix script:</p><p>- camplively[.]com/all.php<br>- camplively[.]com/smks.zip?lap=3928</p><p>SHA256 hash for smks.zip archive containing NetSupport RAT package:</p><p>3be246afee53241eaa9c1f74d6720cc5d1004846ded378bd4b1040064b5631c5</p><p>NetSupportRAT C2: 185.163.45[.]30:443</p><p>cc: <span class="h-card" translate="no"><a href="https://infosec.exchange/@monitorsg" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>monitorsg</span></a></span></p>
The New Oil<p>New <a href="https://mastodon.thenewoil.org/tags/FileFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FileFix</span></a> attack weaponizes <a href="https://mastodon.thenewoil.org/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://mastodon.thenewoil.org/tags/FileExplorer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FileExplorer</span></a> for stealthy commands</p><p><a href="https://www.bleepingcomputer.com/news/security/filefix-attack-weaponizes-windows-file-explorer-for-stealthy-powershell-commands/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/filefix-attack-weaponizes-windows-file-explorer-for-stealthy-powershell-commands/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a></p>
Brad<p>2025-06-18 (Wednesday): <a href="https://infosec.exchange/tags/SmartApeSG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmartApeSG</span></a> --&gt; <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> lure --&gt; <a href="https://infosec.exchange/tags/NetSupportRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetSupportRAT</span></a> --&gt; <a href="https://infosec.exchange/tags/StealCv2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StealCv2</span></a></p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> of the traffic, the malware/artifacts, and some IOCs are available at <a href="https://www.malware-traffic-analysis.net/2025/06/18/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">025/06/18/index.html</span></a>.</p><p>Today's the 12th anniversary of my first blog post on malware-traffic-analysis.net, so I made this post a bit more old school.</p>
Graham Cluley<p>"We don’t just want payment; we want accountability." The malicious hackers behind the Interlock ransomware try to justify their attacks.</p><p>Learn more about what you need to know about Interlock in my article on the Tripwire blog.</p><p><a href="https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tripwire.com/state-of-security</span><span class="invisible">/interlock-ransomware-what-you-need-know</span></a></p><p><a href="https://mastodon.green/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.green/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.green/tags/clickfix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>clickfix</span></a></p>
Herr Dennis 🖖🙂<p>Ich weiß ja nicht, wo ihr euch so herumtreibt, aber das könnte eventuell wichtig sein.</p><p><a href="https://winfuture.de/news,151149.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">winfuture.de/news,151149.html</span><span class="invisible"></span></a></p><p><a href="https://norden.social/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> <a href="https://norden.social/tags/TikTok" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TikTok</span></a> <a href="https://norden.social/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/TikTok" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TikTok</span></a> videos now push <a href="https://mastodon.thenewoil.org/tags/infostealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infostealer</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> in <a href="https://mastodon.thenewoil.org/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/tiktok-videos-now-push-infostealer-malware-in-clickfix-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/tiktok-videos-now-push-infostealer-malware-in-clickfix-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>