You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Recent campaigns mass-produce fake CDN/browser verification pages ("Just a moment…", IUAM-style) that coerce users into copying OS-specific commands from their clipboard into native consoles. This pivots execution out of the browser sandbox and works across Windows and macOS.
118
+
119
+
Key traits of the builder-generated pages
120
+
- OS detection via `navigator.userAgent` to tailor payloads (Windows PowerShell/CMD vs. macOS Terminal). Optional decoys/no-ops for unsupported OS to maintain the illusion.
121
+
- Automatic clipboard-copy on benign UI actions (checkbox/Copy) while the visible text may differ from the clipboard content.
122
+
- Mobile blocking and a popover with step-by-step instructions: Windows → Win+R→paste→Enter; macOS → open Terminal→paste→Enter.
123
+
- Optional obfuscation and single-file injector to overwrite a compromised site’s DOM with a Tailwind-styled verification UI (no new domain registration required).
124
+
125
+
Example: clipboard mismatch + OS-aware branching
126
+
```html
127
+
<divclass="space-y-2">
128
+
<labelclass="inline-flex items-center space-x-2">
129
+
<inputid="chk"type="checkbox"class="accent-blue-600"> <span>I am human</span>
130
+
</label>
131
+
<divid="tip"class="text-xs text-gray-500">If the copy fails, click the checkbox again.</div>
Detection & hunting ideas specific to IUAM-style lures
170
+
- Web: Pages that bind Clipboard API to verification widgets; mismatch between displayed text and clipboard payload; `navigator.userAgent` branching; Tailwind + single-page replace in suspicious contexts.
171
+
- Windows endpoint: `explorer.exe` → `powershell.exe`/`cmd.exe` shortly after a browser interaction; batch/MSI installers executed from `%TEMP%`.
172
+
- macOS endpoint: Terminal/iTerm spawning `bash`/`curl`/`base64 -d` with `nohup` near browser events; background jobs surviving terminal close.
173
+
- Correlate `RunMRU` Win+R history and clipboard writes with subsequent console process creation.
174
+
175
+
See also for supporting techniques
176
+
177
+
{{#ref}}
178
+
clone-a-website.md
179
+
{{#endref}}
180
+
181
+
{{#ref}}
182
+
homograph-attacks.md
183
+
{{#endref}}
184
+
115
185
## Mitigations
116
186
117
187
1. Browser hardening – disable clipboard write-access (`dom.events.asyncClipboard.clipboardItem` etc.) or require user gesture.
@@ -132,5 +202,6 @@ Blue-teams can combine clipboard, process-creation and registry telemetry to pin
132
202
-[Fix the Click: Preventing the ClickFix Attack Vector](https://unit42.paloaltonetworks.com/preventing-clickfix-attack-vector/)
-[Check Point Research – Under the Pure Curtain: From RAT to Builder to Coder](https://research.checkpoint.com/2025/under-the-pure-curtain-from-rat-to-builder-to-coder/)
205
+
-[The ClickFix Factory: First Exposure of IUAM ClickFix Generator](https://unit42.paloaltonetworks.com/clickfix-generator-first-of-its-kind/)
0 commit comments